Connect Okta, Auth0, Microsoft Entra ID, or any OIDC/SAML 2.0 provider to enable secure, centralized authentication for your workspace.
Single sign-on (SSO) is available on Business and Enterprise plans and enables secure, centralized authentication across your organization. With SSO, users can access Lovable with one set of credentials, simplifying access management and improving security.
Service provider (SP)-initiated sign-in only: users must start sign-in from Lovable (SP).Identity provider (IdP)-initiated SSO (starting from an IdP dashboard tile) is not supported.
Lovable supports both OIDC and SAML 2.0 protocols, enabling integration with all major identity providers (IdP) including Okta, Auth0, Microsoft Entra ID (Azure AD), and more.
OpenID Connect (OIDC): recommended; a modern identity layer built on top of OAuth 2.0 that provides identity verification.
SAML (Security Assertion Markup Language) 2.0: XML-based protocol for exchanging authentication and authorization data, widely used in enterprise environments.
If you use Okta, Auth0, or Microsoft Entra, you can find provider-specific documentation for setting up SSO. If you use another provider, see Configure other providers.Before you begin, complete Start SSO setup in Lovable to get the settings and values you need to use in your IdP.
In Okta, copy the following values from the General tab and enter them in Lovable.
Okta Client ID → Lovable OAuth Client ID/Application ID
Okta Client Secret → Lovable OAuth Client Secret
6
Configure display name and SSO login identifier (tenant ID)
In Lovable, update these values as desired. The values are prepopulated based on your verified domain.
Display name: The name shown to users during authentication.
SSO login identifier (tenant ID): The URL users will use to sign in directly with SSO.
7
(Optional) Test the configuration in Lovable
In Lovable, click Test configuration. If everything is configured correctly, the validation should be successful.
8
Finish OIDC provider configuration in Lovable
In Lovable, click Configure provider to finish the configuration of Okta as your OIDC SSO provider.
1
Create an application in Okta Admin Console
Under Applications, click Create App Integration and select SAML 2.0.
Give the app a name, for example Lovable SAML SSO.
2
Configure SAML settings
Single sign-on URL: https://auth.lovable.dev/__/auth/handler
Audience URI (SP Entity ID): https://auth.lovable.dev/__/auth/handler
Name ID format: EmailAddress
3
Save application
Click Finish. Your application is now created in Okta.
4
Provide Lovable with your IdP information
In Okta, go to Sign On → SAML 2.0 → Metadata details, and copy the Metadata URL.In Lovable, choose between quick SAML provider setup or manual configuration:Option 1: Quick setup - import from metadata URLIn Lovable, paste the metadata URL in Quick setup: Import from Metadata URL field. Click Test & Import to automatically populate the required fields below.Option 2: Manual configurationOpen the metadata URL in a new tab. Copy the following Metadata URL values and enter them in Lovable:
Okta SingleSignOnService Location → Lovable SAML SSO Sign-on URL from your IdP
Okta EntityID → Lovable Identity Provider Entity ID / Issuer
In Lovable, choose between quick SAML provider setup or manual configuration:Option 1: Quick setup - import from metadata URL
In Auth0 → Addon: SAML2 Web app → Usage, locate the Identity Provider Metadata, and click the arrow icon to get the URL.
In Lovable, paste the metadata URL in Quick setup: Import from Metadata URL field.
Click Test & Import to automatically populate the required fields below.
Option 2: Manual configurationIn Auth0 → Addon: SAML2 Web app → Usage, copy the following SAML Protocol Configuration Parameter values and enter them in Lovable.
Auth0 Identity Provider Login URL → Lovable SAML SSO Sign-on URL from your IdP
Auth0 Issuer → Lovable Identity Provider Entity ID / Issuer
Download Auth0 certificate and copy the X509Certificate value. Paste the certificate value between the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- lines.
5
Configure display name and SSO login identifier (tenant ID)
In Lovable, update these values as desired. The values are prepopulated based on your verified domain.
Display name: The name shown to users during authentication.
SSO login identifier (tenant ID): The URL users will use to sign in directly with SSO.
6
Finish SAML provider configuration in Lovable
In Lovable, click Configure SAML Provider → Confirm & Enable SSO to finish the configuration of Auth0 as your SAML SSO provider.
Reply URL (Assertion Consumer Service URL): https://auth.lovable.dev/__/auth/handler
Leave the other values blank and select Save.
3
Provide Lovable with your IdP information
When the application is set up in Microsoft Entra, you can choose between quick SAML provider setup or manual configuration in Lovable.Option 1: Quick setup - import from metadata URL
In Microsoft Entra, go to SAML Certificates and copy the App Federation Metadata URL.
In Lovable, paste the App Federation Metadata URL in Quick setup: Import from Metadata URL field.
Click Test & Import to automatically populate the required fields below.
Option 2: Manual configurationCopy the following values in Microsoft Entra and enter them in Lovable.
Microsoft Entra Login URL → Lovable SAML SSO Sign-on URL from your IdP
Microsoft Entra Microsoft Entra Identifier → Lovable Identity Provider Entity ID / Issuer
Microsoft Entra X509Certificate → Lovable X.509 Signing Certificate (public key)
You can download the certificate (Base 64) or open the App Federation Metadata URL in a new tab and copy the X509Certificate value. Paste the certificate value between the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- lines.
4
Configure display name and SSO login identifier (tenant ID)
In Lovable, update these values as desired. The values are prepopulated based on your verified domain.
Display name: The name shown to users during authentication.
SSO login identifier (tenant ID): The URL users will use to sign in directly with SSO.
5
Finish SAML provider configuration in Lovable
In Lovable, click Configure SAML Provider → Confirm & Enable SSO to finish the configuration of Microsoft Entra ID as your SAML SSO provider.
You can configure any OIDC or SAML-compliant provider with Lovable SSO.Before you begin, complete Start SSO setup in Lovable to get the settings and values you need to use in your IdP.
OIDC
SAML
Provider mappingCommon field names across providers:
I already have an account, but I'm joining a business workspace that uses SSO. How do I log in?
If you created your account using another login method (like email/password, Google, or GitHub), you need to log in that way first. Once you’re logged in, navigate to Settings → Your account → Link SSO. This will link your existing account to your company SSO.
Important: If you attempt to log in with SSO before linking your existing account, you’ll see an error. This is a security measure to prevent unauthorized access. Log in using your original method first to complete the linking process.
Which SSO providers does Lovable support?
Lovable supports the industry-standard OIDC and SAML protocols, so you can integrate with any SSO provider that supports them.
Does Lovable support multiple SSO providers per workspace?
No. A workspace can have one active SSO provider configured at a time.
Can I enforce SSO for my workspace?
Yes. The workspace owner or admin can enable Enforce SSO in Settings → Workspace → Identity and choose the session duration to configure how long users stay signed in before requiring re-authentication (24 hours, 48 hours, or 7 days).This requires all workspace members to use SSO for authentication. External collaborators and invite links will be disabled.
Does Lovable support IdP-initiated SSO?
No. IdP-initiated SSO (starting from an IdP dashboard tile) is not supported.Lovable supports SP-initiated sign-in only. Users must start sign-in from Lovable.
Does Lovable support SCIM or automatic user provisioning?
Lovable supports JIT (just-in-time) provisioning: user accounts are created automatically the first time someone signs in via SSO, and they’re added to your company workspace.You can also set a default role for JIT-created users (admin, editor, or viewer) that will be applied when they join via SSO for the first time.
How can I find my tenant ID (SSO login identifier)?
Your tenant ID is the {tenantId} value used in your SSO login URL: https://lovable.dev/sso-login/{tenantId}. It matches the SSO login identifier you configured when setting up your SSO provider in Lovable.You can also find it in Settings → Workspace → Identity after you have configured your provider.
How can I edit my SSO provider configuration?
You cannot edit your configured SSO provider. To make any updates, you first need to delete the existing SSO provider and then configure it again.