Introduction
This guide provides step-by-step instructions for setting up Single Sign-On (SSO) with Branch using Okta as your Identity Provider (IdP).
This guide will show you how to:
Get your configuration details from Branch.
Create and configure a SAML 2.0 application in Okta.
Link back to the main Configure SSO guide to complete the setup.
Configure SSO
To configure SSO, you’ll need to get your unique URLs from Branch, configure Okta, and then finish the setup in Branch.
Before you begin
Before you begin, ensure you have:
Admin access to your Branch account.
Admin access to your Okta account.
SSO enabled for your account.
Access to SSO requires a premium plan. Please contact our Sales team to learn more about pricing and availability.
Step 1: Get configuration details from Branch
In Branch, navigate to Account → Settings → SSO.
Click the Setup SSO button.
You will be taken to a new browser tab. In this tab, click Get Started.
In the Select Your Identity Provider section, select Custom SAML. Then click Next.
You will land on the Configure Custom SAML page. Keep this browser tab open. You will need to copy these two values for the next step:
Single Sign-On URL(also known as Assertion Consumer Service URL)Service Provider Entity ID(also known as Audience URI)

Step 2: Configure Okta SAML
Now, log in to your Okta admin dashboard to create the Branch application.
In Okta, navigation to Applications → Applications and select Create App Integration.
2. Select SAML 2.0 as the sign-on method and click Next.

On the General Settings page, enter an app name (e.g., “Branch”) and click Next.
On the Configure SAML page, in the General section, fill in the fields using the values from the Branch tab you kept open from step 1.
Single sign-on URI: Paste the
Single Sign-On URLfrom Branch.Audience URI (SP Entity ID): Paste the
Service Provider Entity IDfrom Branch.
In the same section, configure the following Okta settings:
Name ID format: Set to
EmailAddressApplication username: Set to
Email.png?sv=2022-11-02&spr=https&st=2025-11-15T13%3A07%3A40Z&se=2025-11-15T13%3A19%3A40Z&sr=c&sp=r&sig=SeCH1azfP2ZHkCvVot2Q0DWLpjK4ahxvSQK3%2FpiztjM%3D)
Step 3: Map attributes in Okta
Branch requires three attributes to be sent in the SAML response to provision and identify users.
Warning
To set up a successful mapping, you must use the attribute names
firstName,lastName, and
Name | Value (Example) |
|---|---|
|
|
|
|
|
|
Still on Okta’s Configure SAML screen, scroll down to the Attribute Statements (Optional) section.
Add the following three attributes and corresponding values. Make sure you enter the names exactly as spelled and cased here.

Select Next and then Finish to save your Okta application.
Step 4: Complete connection in Branch
Your Okta application is now configured. The final step is to provide Okta’s metadata to Branch and test the connection.
In your new Okta application, go to the Sign On tab.
Find the SAML setup instructions and select View SAML setup instructions.
A new page will open with your metadata. Copy the Identity Provider Single Sign-On URL or the Metadata URL.
Go back to your Branch Configure Custom SAML browser tab.
5. Complete step 2.3 in our main guide. Paste your Okta Metadata URL (recommended) or manually enter the Single Sign-On URL and upload the Signing Certificate (also found on the Okta setup instructions page).
Test and enable your connection using step 2.4 in our main guide.
More information
For more complete information about configuring SSO for Branch, visit our Configure SSO (General SAML) guide.