Read time: 3 minutes

Is Flowlity Co-planner secure?

Flowlity recognized as Gartner Cool Vendor 2025 in supply chain planning
Answer:

Yes, and security was a core design decision rather than an afterthought. Three pillars underpin the architecture.

Authentication uses OAuth 2.0 with your existing Flowlity credentials. There's no separate login, no third-party token broker, the same identity that grants access to the Flowlity app grants access to Co-planner.

Authorization enforces your platform permissions on every tool call. A site manager only sees their sites, a planner only sees their perimeter. The AI cannot query data the user wouldn't already be able to query inside Flowlity.

Network isolation keeps traffic off the public internet. Database public IPs are disabled, and authentication is handled by Flowlity's own OAuth service with bearer tokens. There is no public endpoint to attack. For detailed security documentation, your Flowlity CSM can share the full architecture brief on request.

Looking to level up your Supply Chain with AI-driven planning?

Get a demo