Skip to content

SAML SSO setup

Batida supports SAML 2.0 single sign-on on the Enterprise plan. This guide covers how to configure SAML with your identity provider (IdP).

Prerequisites

  • Enterprise plan (or trial)
  • Organization admin access
  • Your IdP metadata URL and certificate

Step 1 — Add a SAML configuration

  1. Navigate to Settings > Security.
  2. In the SSO section, click Add SAML Provider.
  3. Fill in the fields:
FieldDescription
Provider nameA display name for your IdP (e.g., Okta, Azure AD)
IdP Entity IDThe entity ID from your IdP metadata
SSO URLThe Single Sign-On URL from your IdP metadata
CertificateThe X.509 certificate from your IdP
  1. Click Save.

Step 2 — Download SP metadata

After saving, Batida generates a Service Provider (SP) metadata XML:

  1. Navigate to Settings > Security.
  2. In the SSO section, click Download SP Metadata.
  3. Provide this XML file to your IdP administrator.

Step 3 — Test the connection

  1. Navigate to Settings > Security.
  2. Click Test SAML Login.
  3. You will be redirected to your IdP login page.
  4. After authenticating, you're redirected back to Batida and automatically signed in.

Step 4 — Enforce SSO-only authentication (optional)

After SAML is configured, admins can require all members to use SSO:

  1. Navigate to Settings > Security.
  2. Toggle SSO-only authentication.
  3. Members will no longer be able to sign in with email/password.

WARNING

Enabling SSO-only mode does not affect existing sessions. Members already logged in remain logged in until their session expires.

Troubleshooting

ProblemSolution
"Invalid SAML response"Check that the IdP certificate matches the one configured in Batida.
"Redirect loop"Verify that the IdP SSO URL and ACS URL match.
"Certificate expired"Upload the updated certificate from your IdP.

Built by the Batida team