Configure Lovable single sign-on (SSO) using OIDC or SAML 2.0 with your identity provider for secure, centralized workspace authentication.
Single sign-on (SSO) is available on Business and Enterprise plans and enables secure, centralized authentication across your organization. With SSO, users can access Lovable with one set of credentials, simplifying access management and improving security.
Service provider (SP)-initiated sign-in only: users must start sign-in from Lovable (SP).Identity provider (IdP)-initiated SSO (starting from an IdP dashboard tile) is not supported.
Lovable supports both OIDC and SAML 2.0 protocols, enabling integration with all major identity providers (IdP) including Okta, Auth0, Microsoft Entra ID (Azure AD), and more.
OpenID Connect (OIDC): recommended; a modern identity layer built on top of OAuth 2.0 that provides identity verification.
SAML (Security Assertion Markup Language) 2.0: XML-based protocol for exchanging authentication and authorization data, widely used in enterprise environments.
If you use Okta, Auth0, or Microsoft Entra, you can find provider-specific documentation for setting up SSO. If you use another provider, see Configure other providers.Before you begin, complete Start SSO setup in Lovable to get the settings and values you need to use in your IdP.
In Okta, copy the following values from the General tab and enter them in Lovable.
Okta Client ID → Lovable OAuth Client ID/Application ID
Okta Client Secret → Lovable OAuth Client Secret
6
(Optional) Test the configuration in Lovable
In Lovable, click Test configuration. If everything is configured correctly, the validation should be successful.
7
Finish OIDC provider configuration in Lovable
In Lovable, click Configure provider to finish the configuration of Okta as your OIDC SSO provider.
1
Create an application in Okta Admin Console
Under Applications, click Create App Integration and select SAML 2.0.
Give the app a name, for example Lovable SAML SSO.
2
Configure SAML settings
Single sign-on URL: https://auth.lovable.dev/__/auth/handler
Audience URI (SP Entity ID): https://auth.lovable.dev/__/auth/handler
Name ID format: EmailAddress
3
Save application
Click Finish. Your application is now created in Okta.
4
Provide Lovable with your IdP information
In Okta, go to Sign On → SAML 2.0 → Metadata details, copy the Metadata URL and open it in a new tab.Copy the following Metadata URL values and enter them in Lovable:
Okta SingleSignOnService Location → Lovable SAML SSO Sign-on URL from your IdP
Okta EntityID → Lovable Identity Provider Entity ID / Issuer
Download Auth0 certificate and copy the X509Certificate value. Paste the certificate value between the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- lines.
5
Finish SAML provider configuration in Lovable
In Lovable, click Configure SAML Provider → Confirm & Enable SSO to finish the configuration of Auth0 as your SAML SSO provider.
Reply URL (Assertion Consumer Service URL): https://auth.lovable.dev/__/auth/handler
Leave the other values blank and select Save.
3
Provide Lovable with your IdP information
When the application is set up, copy the following values and enter them in Lovable.
Microsoft Entra Login URL → Lovable SAML SSO Sign-on URL from your IdP
Microsoft Entra Microsoft Entra Identifier → Lovable Identity Provider Entity ID / Issuer
Microsoft Entra X509Certificate → Lovable X.509 Signing Certificate (public key)
You can download the certificate (Base 64) or open the App Federation Metadata URL in a new tab and copy the X509Certificate value. Paste the certificate value between the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- lines.
4
Finish SAML provider configuration in Lovable
In Lovable, click Configure SAML Provider → Confirm & Enable SSO to finish the configuration of Microsoft Entra ID as your SAML SSO provider.
You can configure any OIDC or SAML-compliant provider with Lovable SSO.Before you begin, complete Start SSO setup in Lovable to get the settings and values you need to use in your IdP.
OIDC
SAML
Provider mappingCommon field names across providers:
I already have an account, but I'm joining a business workspace that uses SSO. How do I log in?
If you created your account using another login method (like email/password, Google, or GitHub), you need to log in that way first. Once you’re logged in, navigate to Settings → Your account → Link SSO. This will link your existing account to your company SSO.
Important: If you attempt to log in with SSO before linking your existing account, you’ll see an error. This is a security measure to prevent unauthorized access. Log in using your original method first to complete the linking process.
Which SSO providers does Lovable support?
Lovable supports the industry-standard OIDC and SAML protocols, so you can integrate with any SSO provider that supports them.
Does Lovable support multiple SSO providers per workspace?
No. A workspace can have one active SSO provider configured at a time.
Can I enforce SSO for my workspace?
Yes. The workspace owner or admin can enable Enforce SSO in Settings → Workspace → Identity and choose the session duration to configure how long users stay signed in before requiring re-authentication (24 hours, 48 hours, or 7 days).This requires all workspace members to use SSO for authentication. External collaborators and invite links will be disabled.
Does Lovable support IdP-initiated SSO?
No. IdP-initiated SSO (starting from an IdP dashboard tile) is not supported.Lovable supports SP-initiated sign-in only. Users must start sign-in from Lovable.
Does Lovable support SCIM or automatic user provisioning?
Lovable supports JIT (just-in-time) provisioning: user accounts are created automatically the first time someone signs in via SSO, and they’re added to your company workspace.You can also set a default role for JIT-created users (admin, editor, or viewer) that will be applied when they join via SSO for the first time.
How can I find my tenant ID (SSO login identifier)?
Your tenant ID is the {tenantId} value used in your SSO login URL: https://lovable.dev/sso-login/{tenantId}. It matches the SSO login identifier you configured when setting up your SSO provider in Lovable.You can also find it in Settings → Workspace → Identity after you have configured your provider.