Welcome to FlowZap, the App to diagram with Speed, Clarity and Control.

Templates

Explore ready-to-use FlowZap workflow templates. Search by keyword and filter with valuable SEO-focused tags. Want to share your FlowZap Code creation? With your name and a link to your website and all? Submit your FlowZap Code here.

Top tags:

113 templates

Ab Test Setup Workflow

A/B test setup workflow with hypothesis definition, variant creation, traffic allocation, statistical analysis, and winner deployment.

Access Review Workflow

Quarterly user access review workflow with manager certification, separation of duties validation, remediation tracking, and compliance reporting for audit purposes.

Account Deletion Workflow

Account deletion workflow with cancellation reason capture, retention offer, subscription termination, data cleanup, and confirmation email.

Api Key Rotation Workflow

API key rotation workflow with new key generation, dual-key transition period, client notification, old key deprecation, and audit logging.

Authentication Flow Workflow

User authentication workflow with credential validation, MFA challenge, JWT token generation, session creation, and failed attempt tracking.

Batch Processing Workflow

Batch processing pattern with job scheduling, chunk-based processing, checkpoint/restart capability, error handling, and completion reporting.

Billing Dispute Workflow

Billing dispute workflow with dispute intake, transaction review, fraud analysis, resolution decision, and chargeback response handling.

Certificate Renewal Workflow

SSL/TLS certificate renewal workflow with expiration monitoring, certificate request by type (DV/OV/EV), domain validation, deployment to load balancers, and health check verification with rollback.

Cohort Analysis Workflow

Cohort analysis workflow with user segmentation by signup date, retention curve calculation, LTV projection, and behavioral pattern identification.

Cold Chain Monitoring Workflow

Cold chain monitoring workflow with IoT temperature sensors, real-time alerts, excursion documentation, corrective action triggers, and compliance reporting.

Customs Clearance Workflow

International customs clearance workflow with importer documentation, customs broker HS code classification, duty calculation, customs authority inspection, and clearance certificate issuance.

Data Export Workflow

User data export workflow with export request, async job processing, data aggregation, secure file generation, and download link delivery.

Deployment Rollback Workflow

Deployment rollback workflow with issue detection, rollback decision, previous version restoration, health verification, and post-mortem documentation.

Dunning Flow Workflow

Dunning collection workflow with escalating reminder emails, grace period management, account suspension, and payment recovery tracking.

Email Campaign Workflow

Email marketing campaign workflow with audience segmentation, A/B testing, send scheduling, deliverability monitoring, and engagement analytics.

Gdpr Deletion Workflow

GDPR data deletion workflow with identity verification, data inventory scan, PII removal across systems, backup purging, and deletion confirmation.

In App Message Workflow

In-app messaging workflow with trigger conditions, audience targeting, message display, user interaction tracking, and conversion measurement.

Incident Response Workflow

Production incident response workflow with severity-based routing, war room coordination, incident commander assignment, customer communication, root cause analysis, and postmortem scheduling.

Insurance Claim Workflow

Insurance claim processing workflow with incident documentation, claim filing, adjuster assignment, damage assessment, and settlement negotiation.

Knowledge Base Workflow

Knowledge base management workflow with article creation, review approval, SEO optimization, version control, and search analytics tracking.

Monitoring Alert Workflow

Monitoring and alerting workflow with metric collection, threshold evaluation, alert routing, escalation policies, and incident creation.

Oauth Flow Workflow

OAuth 2.0 authorization code flow with redirect handling, code exchange, token storage, refresh token rotation, and scope management.

On Call Rotation Workflow

On-call rotation workflow with schedule creation, shift handoffs, override management, escalation policies, and fair rotation distribution.

Packing Process Workflow

Order packing workflow with carton selection, item verification, packing slip insertion, weight check, and package sealing for shipment.

Payment Failure Workflow

Failed payment recovery workflow with smart retry scheduling, dunning email sequence, payment method update prompts, and involuntary churn prevention.

Personalization Engine Workflow

Make.com automation scenario for real-time personalization using Segment events, ML recommendation API, and Braze campaign delivery across email and push channels.

Plan Downgrade Workflow

Subscription plan downgrade workflow with retention offer, feature restriction warning, data migration handling, and end-of-period scheduling.

Plan Upgrade Workflow

Subscription plan upgrade workflow with feature comparison, proration calculation, immediate feature unlock, and billing adjustment.

Secret Rotation Workflow

Automated secret rotation workflow with HashiCorp Vault for API keys, database passwords, and certificates including Kubernetes secret updates and rolling service restarts.

Security Scan Workflow

Security scanning workflow with SAST, DAST, dependency vulnerability scanning, finding triage, and remediation tracking in CI/CD pipeline.

Shipping Process Workflow

Order shipping workflow with carrier selection, rate shopping, label generation, tracking number assignment, and dispatch confirmation.

Sms Verification Workflow

SMS phone verification workflow with OTP generation, rate limiting, code validation, retry handling, and verification status tracking.

Subscription Lifecycle Workflow

SaaS subscription lifecycle workflow with trial signup, conversion nurturing, payment processing, renewal management, and churn prevention campaigns.

Support Ticket Workflow

Customer support ticket workflow with auto-categorization, SLA tracking, agent assignment, escalation rules, and satisfaction survey.

Two Factor Setup Workflow

Two-factor authentication setup workflow with method selection (TOTP/SMS), QR code generation, backup codes, and verification confirmation.

User Onboarding Workflow

New user onboarding workflow with welcome email, profile setup, product tour, first action prompt, and activation milestone tracking.

User Segmentation Workflow

User segmentation workflow with attribute collection, behavioral event tracking, segment rule definition, dynamic membership, and downstream sync.

Vendor Onboarding Workflow

Vendor onboarding workflow with application review, W-9/W-8BEN verification, insurance certificate validation, background checks, and compliance approval before vendor activation.

Vulnerability Patch Workflow

Security vulnerability patching workflow with CVE scanning, severity-based triage (critical/high/medium), patch testing, staging deployment, and production rollout with rollback capability.

Shopify Universal Commerce Protocol

End-to-end agentic commerce workflow showing how an AI assistant (ChatGPT) orchestrates product search, checkout, and payment through Shopify's Universal Commerce Protocol (UCP) gateway, enabling conversational shopping experiences.

Microservices API Gateway Architecture

A microservices API gateway architecture diagram showing request routing, JWT authentication, rate limiting, service discovery, and response aggregation across distributed backend services. This template models the entry point for all client traffic in a microservices ecosystem, enforcing security policies before requests reach internal services. Ideal for platform engineers designing scalable API infrastructure with centralized cross-cutting concerns.

Microservices Service Mesh Architecture

A service mesh architecture diagram with Istio or Linkerd sidecar proxies handling mTLS encryption, traffic policies, circuit breaking, and distributed tracing across microservices. This template visualizes how a service mesh abstracts networking concerns away from application code, enabling zero-trust communication between services. Essential for teams adopting service mesh infrastructure to improve observability and security.

Microservices Decomposition by Business Capability

A microservices decomposition architecture diagram organized by business capabilities: Identity, Product Catalog, Pricing, and Order Fulfillment, each with independent data stores and APIs. This template shows how to break a monolith into services aligned with business domains, using a Backend-for-Frontend (BFF) pattern for client-specific aggregation. Useful for architects planning domain-driven microservice boundaries.

Event-Driven Dead Letter Queue Architecture

A dead letter queue architecture diagram with retry policies, exponential backoff, max retry thresholds, DLQ routing for failed messages, operations alerting, and manual reprocessing workflows. This template models the critical error handling pattern for asynchronous messaging systems, ensuring no message is silently lost when processing fails. Essential for building reliable event-driven systems with proper failure recovery mechanisms.

Saga Order Fulfillment Architecture

An order fulfillment saga architecture diagram with four sequential steps: customer verification, inventory reservation, payment authorization, and shipment creation, with a compensation chain that reverses completed steps on failure. This template models the end-to-end order lifecycle as a saga, showing how each service participates in the transaction and how compensating actions maintain data consistency. Ideal for e-commerce architects designing reliable order processing pipelines.

Bulkhead Isolation Architecture

A bulkhead isolation architecture diagram with separate thread pools for critical, standard, and batch workloads, each with independent connection pools, exhaustion detection, and backpressure strategies to prevent one workload from starving others. This template models the bulkhead pattern inspired by ship hull compartments, where resource isolation ensures that a failure or overload in one component cannot cascade to others. Critical for systems requiring guaranteed availability for high-priority operations.

Rate Limiter Architecture

A rate limiter architecture diagram implementing the token bucket algorithm with Redis-backed distributed counters, sliding window logs, API key identification, rate limit headers, and multi-node synchronization for consistent enforcement. This template shows how to protect APIs from abuse and ensure fair usage across clients, with proper HTTP 429 responses and Retry-After headers. Essential for API platform teams building production-grade rate limiting infrastructure.

Health Check Pattern Architecture

A health check pattern architecture diagram with load balancer probes, deep health checks verifying database, cache, disk, and dependency status, automatic instance rotation, and alerting integration with PagerDuty for consecutive failures. This template models the health monitoring infrastructure that enables self-healing systems, where unhealthy instances are automatically removed from rotation and operations teams are alerted. Key for building production-ready services with proper observability.

API Composition Pattern Architecture

An API composition architecture diagram with a composer service that fans out parallel requests to multiple microservices, collects responses with timeout handling, and merges results into a single unified response with partial fallback support. This template models the API composition pattern used when a single client query requires data from multiple services, avoiding the need for direct service-to-service calls. Useful for teams building aggregation layers in microservices architectures.

Zero Trust Security Architecture

A zero trust security architecture diagram with device posture checks, MFA identity verification, risk-based policy decisions, short-lived JWT tokens, micro-segmentation, mTLS encryption, least-privilege access enforcement, and continuous monitoring. This template models the 'never trust, always verify' security paradigm where every request is authenticated and authorized regardless of network location. Essential for security architects implementing modern zero-trust frameworks in cloud-native environments.

Multi-Tenant SaaS Architecture

A multi-tenant SaaS architecture diagram with tenant identification, tier-based routing (shared vs dedicated pools), row-level security, per-tenant encryption keys, and isolated backup strategies for standard and enterprise isolation models. This template models the architecture decisions for building SaaS platforms that serve multiple customers from shared infrastructure while maintaining strict data isolation. Critical for SaaS architects balancing cost efficiency with enterprise security requirements.

Data Mesh Architecture

A data mesh architecture diagram with domain-oriented data ownership across Sales, Marketing, and Finance domains, each exposing self-serve data products through APIs with quality SLAs, governed by a federated data platform with a shared catalog and cross-domain query engine. This template models the paradigm shift from centralized data teams to domain-owned data products, applying microservices principles to data architecture. Essential for organizations scaling data operations beyond centralized data warehouse bottlenecks.

Observability Three Pillars Architecture

An observability architecture diagram implementing the three pillars (metrics, traces, logs) with OpenTelemetry SDK instrumentation, OTLP collector pipeline, Prometheus, Jaeger, and Loki backends, Grafana dashboards, SLO/SLI tracking, and PagerDuty alerting integration. This template provides a complete observability stack reference showing how telemetry data flows from application instrumentation through collection, storage, visualization, and incident response. Essential for SRE teams building production monitoring infrastructure.

AI-Native Parallel Fan-Out Architecture

A parallel fan-out architecture that runs multiple agents simultaneously on independent checks (style, security, performance) and then merges results. This is a standard multi-agent design approach for throughput, mapping cleanly to CI/CD, incident response, and research. Fan-in reconciliation becomes the subtle part.

AI Orchestration - Parallel Fan-Out (Map-Reduce)

A map-reduce style architecture where a coordinator fans out tasks to multiple parallel worker agents (style check, security audit, performance analysis), gathers all results, and makes an aggregate decision. Best for PR reviews, code reviews, and multi-dimensional analysis.

MCP Direct Connect Architecture

The simplest MCP pattern — direct connection between host application and MCP server over stdio or HTTP. No extra hops, lowest latency, easiest debugging. Perfect for MVPs, hackathons, and single-team setups where security governance is not yet a concern.

MCP Gateway Proxy Architecture

An API gateway pattern that sits between agents and MCP servers to handle authentication, rate limits, and auditing. The gateway enforces OAuth 2.0, SAML, SSO, tool-level rate limiting, and team-based quotas. Essential for multi-team or multi-tenant MCP deployments.

Zero Trust Agent Identity Pipeline

Zero-trust AI agent identity architecture with JWT validation, scoped OBO token exchange, SPIFFE/SVID workload identity, and MCP tool authorization.

MCP Zero-Trust Boundary

MCP security gateway architecture that authenticates tool calls, routes execution into isolated sandboxes, sanitizes responses, and returns clean results to the AI agent.

Runtime Permission Gating

Least-privilege AI agent architecture with policy-engine evaluation, just-in-time access, short-lived credentials, and action-scoped grants before tool execution.

Risk-Tiered Human-in-the-Loop

Human-in-the-loop approval architecture that scores agent actions by risk, routes high-risk requests for review, and writes immutable audit records.

Secure Multi-Agent Communication

Multi-agent security architecture with scoped tokens, API gateway enforcement, mTLS-protected worker calls, and orchestrator-driven result aggregation.