This guide explains how to configure Single Sign-On (SSO) connections within the Baserow Admin Panel, allowing you to connect identity providers like Okta, Google, Azure AD, and more.
SSO is available on the Baserow Advanced and Enterprise plans. You must have a valid license activated to configure these settings. Visit the pricing page.
Baserow SSO allows Instance Admins to connect external Identity Providers (IdP), enabling users to log in with their corporate credentials instead of creating unique Baserow accounts.
To manage these settings, you must be an Instance Admin. Navigate to Admin Tools > General -> Authentication.
There are two primary ways to connect an Identity Provider:
To view the list of providers, visit this page

Use this method for enterprise-grade identity providers like Okta, OneLogin, or Azure AD.
Single Sign On URL (ACS URL)Default Relay State URLSpecific setup guides:
Use this method for social logins or delegated authentication providers like Google Workspace or GitHub.
Specific setup guides:

Once configured, you can manage how users interact with these login methods.
To modify an existing connection (e.g., to rotate a Client Secret):
For strict security, you may want to force users to log in only via SSO.
Learn more: Email/Password authentication
⚠️ Warning: Do not disable Email/Password authentication unless you have fully verified that your SSO provider is working correctly. If SSO fails and password login is disabled, you may lock yourself out of the instance.
This error occurs if a user already has a Baserow account (created via Email/Password) and tries to log in via Okta SSO later. For security reasons, Baserow does not automatically merge these identities by default.
Solutions:
This option should only be considered if data loss is acceptable and after ensuring all data is backed up elsewhere.
BASEROW_ALLOW_MULTIPLE_SSO_PROVIDERS_FOR_SAME_ACCOUNT=true on the server. This allows merging but increases security risk.For optimal security, we recommend maintaining consistent authentication methods unless necessary. If enabling multiple login methods is essential, implement additional security measures to mitigate potential risks.
Learn more: SSO configuration
The Relay State is a URL parameter that tells the Identity Provider where to send the user after they successfully log in. In Baserow, this ensures the user is redirected back to the dashboard or the specific page they were trying to access.
Yes. You can add multiple providers (e.g., both GitHub and Google). All active providers will appear as buttons on the login page.
If you disable “Email and Password” login and your SSO provider stops working, you will lose access to the Admin Panel. To recover access, you must use the Baserow server command line (CLI) to manually re-enable password authentication.
Baserow currently supports JIT (Just-In-Time) provisioning, meaning user accounts are created automatically the first time they log in via SSO. Full SCIM (User syncing/deprovisioning) is not currently supported via the Admin Panel.
Still need help? If you’re looking for something else, please feel free to make recommendations or ask us questions; we’re ready to assist you.
Contact support for questions about Baserow or help with your account.