Site & team management /Security /Secure access to Netlify /

Configure Team SAML SSO

This feature is available on Enterprise plans.

Team Owners can allow, and optionally require, team members to log in to Netlify through their company’s SAML single sign-on (SSO) provider.

Team Owners can configure SSO through an identity provider for one team at a time. If you want to set up SAML SSO for all teams in an organization, then we recommend you check out Organization SAML single sign-on.

We also generally recommend Organization SAML single sign-on for more streamlined setup and because it can offer a better experience for managing Netlify user access control in the visual editor.

Users who log in with Team SSO must have an email address that matches their user ID in your identity provider. For example, a Netlify user with the email address jane@company.com must also have this exact email address in your identity provider.

SSO login support for Reviewers

The ability for Reviewers to log in to the Netlify app and collaborate on deploys using SAML SSO is currently in beta and is available on Enterprise plans.

# Configure SSO for your team

First, you’ll need to configure a SAML SSO app or integration for Netlify within your identity provider. Next, you must complete your SAML SSO setup in Netlify. Finally, choose whether to require your users to log in to Netlify with SSO through your identity provider.

Before configuring SAML SSO in your identity provider, we recommend you log in to Netlify to easily access the URLs you will need for your identity provider setup. To preview these URLs on Netlify, go to

so you can copy the required Netlify setup URLs when needed.

Want to set up SSO for multiple teams?

Consider setting up SAML SSO for all teams in your Netlify organization using Organization SSO, which includes a guided flow.

# 1. Set up a Netlify SAML integration or app in your identity provider

Choose an identity provider below for specific guidance on setting up a SAML SSO login for your Netlify team.

Choose your identity provider:

To configure Netlify SAML SSO with Okta:

  1. In your Okta Admin portal, go to Applications and select Create App Integration.
  2. For Sign-in method, select SAML 2.0 and then Next.
  3. Next to App name, enter a name for your Netlify integration. If you plan to use more than one team with Netlify, you may choose to include “Netlify” and your Netlify team name. Optionally, include the Netlify app logo. Then, select Next.
  4. To configure your SAML integration, copy and paste your Netlify SAML SSO URLs into Okta. To access these URLs on Netlify, go to .
  5. Copy the required Netlify URLs into Okta.
    • In Netlify, copy the ACS URL and paste this URL in Okta next to Single sign-on URL. Select Use this for Recipient URL and Destination URL.
    • In Netlify, copy the Entity ID and paste this URL in Okta next to Audience URI (SP Entity ID).
  6. In Okta, under Attribute Statements, add mappings for your users manually.
  7. To complete the Okta SAML SSO app integration setup wizard steps, share feedback on the type of Okta Support you may need for this integration.
    • Select I’m an Okta customer adding an internal app.
    • For App type, select This is an internal app that we have created.
  8. Select Finish.
  9. To copy your integration’s Metadata XML and Metadata URL for the setup steps in Netlify, scroll to the bottom of your new Netlify Team SSO app integration page in Okta and select View SAML setup instructions.

You may want to keep this Okta setup page open for the next steps in Netlify to copy the Metadata URL and XML.

For more help with setting up your Netlify integration with Okta, check out these Okta SAML app integration docs.

# 2. Complete SAML SSO setup in Netlify

After configuring your SAML Netlify app/integration in your identity provider and copying your app’s Metadata URL and Metadata XML, you can complete your SSO set up in Netlify.

  1. On Netlify, go to

    and select Configure SAML.

  2. Paste the Metadata URL and Metadata XML that you copied from your identity provider. Confirm with Save.

Now team members should be able to optionally log in to your team using SSO through your identity provider. Note that before a team member first logs in to Netlify using your team’s SSO setup, they must go to their email inbox to verify their email address through an email we send. This applies even if the team member already had access to your team.

The standard Netlify login interface includes a link to log in using SSO.

# 3. Choose whether to require SSO login through your identity provider

By default, once you complete SAML SSO configuration for your team, SSO login through your identity provider is optional for all Netlify team members. If you want to require SSO login, you must change your Team SSO settings.

Team SSO login exceptions

Note that Git Contributors cannot log in to Netlify using the SSO login you set up through your identity provider. Git Contributors also cannot access the Netlify app.

As a final setup step, choose how you want your team members to log in to the Netlify app with these options:

  • Enforce SSO login for all. Require all Netlify team members (except Git Contributors) to log in using SSO through your identity provider to access your Netlify app. In the Netlify UI, this option is Only SSO allowed (strict). Learn more about the strict SSO login type.
  • Enforce SSO login with Team Owners exception. Require all Netlify team members (except Team Owners and Git Contributors) to log in using SSO through your identity provider with an exception for Netlify Team Owners in case they lose access to the identity provider. In the Netlify UI, this option is Only SSO allowed (with Owner fallback). Learn more about this Owner fallback login type.
  • Optional SSO login through your identity provider. Team members can choose to log in to Netlify using their email, GitHub, GitLab, or Bitbucket login. In the Netlify UI, this option is All login types allowed. Learn more about this login type.

For more detailed instructions, check out Manage Team SSO login types.

# Manage Team SSO login types

By default, teams with single sign-on enabled allow but do not require team members to log in using SSO. Team Owners can change the allowed login types to require that team members be logged in using SSO in order to access the team. To do this, go to

and select Edit login types.

Then choose how team members can access your team. You can select All login types allowed, Only SSO allowed (with Owner fallback), or Only SSO allowed (strict).

# All login types allowed

When all login types are allowed, team members will still be able to access your team when logged in with email, GitHub, GitLab, or Bitbucket. SSO becomes a new login option, but it is not required. You might have team members accessing your team with their personal users rather than with users that have company email addresses that you provision using your identity provider.

# Only SSO allowed

The Only SSO allowed option includes two variants for different scopes of enforcement based on team member roles.

  • Only SSO allowed (with Owner fallback): all team members except Owners will be required to log in using SSO to access your team. Team Owners will still be able to log in with email, GitHub, GitLab, or Bitbucket, in case your identity provider has an outage or other issue.
  • Only SSO allowed (strict): all team members, including Owners, will be required to log in using SSO to access your team.

When you set Login types to either of the options above, several things (as outlined below) will happen to ensure that your team can be accessed by only the users you’ve provisioned with your identity provider. To facilitate this you’ll need to enter your company email domain in the form of @corp.com.

In the points below, “affected team members” refers to all non-Owner team members when selecting enforcement with Owner fallback, and to all team members when selecting strict enforcement.

  • Affected team members with email addresses outside of the company email domain will be removed from this team. Before saving this setting you may want to check the email addresses in your team member list and ask team members to ensure their email address is on the company email domain.
  • Remaining affected team members who logged in with email, GitHub, GitLab, or Bitbucket will be denied access to the team until they sign out and then log back in using SSO. You may want to let your team members know to expect this, especially if they are a member of other teams where all login types are allowed.
  • API calls using access tokens generated by affected team members will be denied access by default. This applies to both personal access tokens and tokens from authorized applications. You may want to let your team members know to expect this, especially if they generated tokens in the past. If your team needs to use access tokens, there are a couple options:
    • You can select enforcement with Owner fallback which won’t affect access tokens generated by Team Owners.
    • Affected team members can generate new tokens and grant SAML access to those tokens.
  • All team members (including Owners) will no longer be able to save changes to their email address or password in their user settings. These changes will need to be made using your identity provider.