What Is SAML?
SAML lets your team sign in to Taskade with the same Okta credentials they already use everywhere else — no second password to remember, no shadow IT. Identity lifecycle (joiners, movers, leavers) stays governed inside Okta. This guide walks through the full Okta + Taskade configuration in roughly 10 minutes.
TL;DR: In Okta, create a SAML 2.0 app integration with Single sign-on URL
https://www.taskade.com/saml/sso/login/callbackand Audience URIhttps://www.taskade.com/saml/sso/metadata. Add anuser.email. Copy Okta's SSO URL, Issuer, and X.509 certificate into Taskade's Settings → Organization → SAML SSO. Available on Business and Enterprise plans.
💡 Note: If your team is already using Taskade, your identity provider will take ownership of those accounts. Please inform your team before enabling SAML.
Configure with Okta
Requirements
The main account must be set up with a company email address.
Personal email accounts are not allowed.
Your email must be verified.
This feature is only available on the Business and Enterprise plans.
Okta Setup
Go to Applications on your Okta dashboard and select "Create App Integration."

Choose SAML 2.0 and click"Next."

In General Settings, Enter "Taskade" under "App name" and upload a logo (optional).

On the "Configure SAML" screen (section A), enter the following information:
Single sign-on URL: https://www.taskade.com/saml/sso/login/callback
Important: Keep "Use this for Recipient URL and Destination URL" checked.
Audience URI (SP Entity ID): https://www.taskade.com/saml/sso/metadata
Name ID format: EmailAddress

Go to "Attribute Statements (optional)" and add the following details:
- Name: email
- Value: user.email

Once you're done, scroll down and click "Next." When prompted, select "I'm an Okta customer adding an internal app".
💡 Note: When asked "Which app pages did you consult to configure SAML?", use the following link: /learn/account/saml-okta Repeat the step for "Did you find SAML docs for this app?"
Once you're done, scroll down and click "Finish."
On the following page, find "SAML Setup" on the right and click "View SAML setup instructions." Keep this page open.

Taskade Setup
💡 Note: Read the requirements before completing these steps.
Visit https://taskade.com/settings and navigate to the Organization tab
Enter the following information on the security screen: Domain: Enter your company's domain, e.g., company.com without "https://" or "www."
- SSO URL: Paste the "Identity Provider Single Sign-On URL" from the Okta setup instructions page.
- IDP ISSUER: Paste the "Identity Provider Issuer" from the Okta setup instructions page.
- IDP PUBLIC SIGNING CERT: Paste the "X.509 Certificate" from the Okta setup instructions page.
Next, select one or more workspaces you'd like people to SSO into.
- Important: Selected workspaces must be upgraded to the Business or Enterprise plan; you must select at least one workspace. If you'd like to add or remove a workspace from SSO, contact [email protected].
Finally, click on "Configure" when you're done.
Once you've configured SAML for your organization, ensure that Taskade is assigned to individuals or groups in your directory inside the Okta Dashboard.
Anyone with an email address in your business's domain can now go to https://taskade.com/login and choose "Sign In with Single Sign-On" to sign.
Related guides
- SAML via Azure AD — SSO setup with Microsoft Entra / Azure AD
- SAML via Google Workspace — SSO setup with Google Workspace
- SCIM via Okta — Automated user provisioning
- MFA Setup — Layer multi-factor on top of SSO
- Transfer Ownership — Hand off the SSO-enabled workspace
