This guide explains how to configure Single Sign-On (SSO) using Okta as your Identity Provider (IdP) for Baserow.
SSO is available on the Baserow Advanced and Enterprise plan. You must have a valid license activated to configure these settings.
The Baserow Okta integration allows teams to centralize identity management, enabling users to log in to Baserow using their existing Okta credentials via the SAML 2.0 protocol.
Setting up this connection involves three main phases:

Log in to your Okta Admin Console.
Navigate to Applications > Applications in the sidebar.
Click Create App Integration.
Select SAML 2.0 as the Sign-in method and click Next.
General Settings:
Baserow.
In this step, you will tell Okta where to send the authentication data. You will need two URLs from your Baserow instance.
Return to Okta and paste the URLs into the corresponding fields:
| Okta Field | Value from Baserow |
|---|---|
| Single sign on URL | Paste your Baserow Single Sign On URL |
| Audience URI (SP Entity ID) | Paste your Baserow Single Sign On URL (Again) |
| Default RelayState | Paste your Baserow Default Relay State URL |
If no Default RelayState value is set, a blank RelayState is sent
You must define how Okta sends user data to Baserow. If these are incorrect, users will be created without names or emails.
Scroll down to Attribute Statements and add the following three mappings exactly as written:
| Name (Baserow Variable) | Value (Okta Profile Field) |
|---|---|
user.email |
user.email |
user.first_name |
user.firstName |
user.last_name |
user.lastName |
The “Name” column must be lower-case and use underscores (e.g.,
user.first_name), while the “Value” column refers to Okta’s internal variable naming (e.g.,user.firstName).
You can preview the SAML assertion generated from the information inputted. This displays the XML that will be used in the assertion; use it to verify the information you entered.
Now that the app is created in Okta, you need to give the security metadata back to Baserow.
In Okta, go to the Sign On tab of your new Baserow application.
Scroll down to the SAML Signing Certificates section.
Locate the Active certificate and click Actions > View IdP metadata.
A new tab will open with a block of XML code. Copy the entire XML string.
Return to your Baserow Admin Panel.
In the Add SAML Provider modal (where you copied the URLs earlier):
Okta.Click Save.

Your connection is set up, but Okta will block users from signing in until you explicitly grant them access.
If users are created but their First or Last names are missing, check Configure SAML Settings. The Attribute Statements must precisely match user.first_name and user.last_name.
Baserow supports Just-In-Time (JIT) provisioning. This means you do not need to manually create users in Baserow. As soon as you assign a user in Okta and they log in for the first time, their account is automatically created in Baserow. Full SCIM (automated deprovisioning) is not currently configured via this UI.
Yes. Once you have verified that the Okta login works, you can disable the “Email and Password” provider in the Baserow Authentication settings.
The Audience URI (Entity ID) is a unique identifier that tells Okta exactly which application it is talking to. This is most often the SP Entity ID of your application. For Baserow, this is the same as your Single Sign On URL (e.g., https://baserow.io/api/sso/saml/login/).
Currently, Baserow does not support automatic role mapping via SSO attributes. When a user logs in via Okta for the first time, their account is created with a default role (usually a generic member). An Admin must manually assign them to specific Workspaces and Roles within Baserow.
Still need help? If you’re looking for something else, please feel free to make recommendations or ask us questions; we’re ready to assist you.
Contact support for questions about Baserow or help with your account.