Search specific term/phrase surrounded by double quotes. e.g. “deep linking”
Exclude records that contain a specific term prefixed with a minus. e.g. Android -Firebase

Enable Single Sign On

Overview

Branch offers Security Assertion Markup Language (SAML) / Single Sign-on (SSO) support for Branch Dashboard. This allows you to use your identity provider (IdP) to centralize access to various services for your team and leverage existing directory systems and security groups.

Prerequisites

  1. The IdP you are using supports SAML (ex. Okta, OneLogin, Microsoft Azure AD, etc.)
  2. Your company's IT department ready to configure SAML that knows your company's email domains
  3. Admin Access Level to your Branch account

Enable SSO

1. Add Branch to your Identity Provider

Add Branch to your IdP - Add the following SAML attribute mappings:

SAML AttributeField it Should Map to in Your IdP
emailUser's email address
firstNameUser's first name
lastNameUser's last name

Here is some initial information that your IdP might ask for:

IdP FieldValue
PlatformWeb
Sign-on methodSAML 2.0
Application nameBranch
LogoDownload here
ACS URLhttps://<subdomain>.dashboard.branch.io/sso/callback
Entity ID or Audience URIhttps://<subdomain>.dashboard.branch.io
SP MetadataNone

🚧

SSO Name ID Format

Branch only supports SSO Name ID Formats, basic or unspecified.

Once this is complete, your IdP will provide you with details that you'll need to add to the Branch Dashboard to enable SSO.

2. Add Your IdP Details Back to Branch

In the Branch Dashboard navigate to Account Settings > SSO tab. If you're already logged into the Branch Dashboard, you can click here to go there directly. Enable SSO by toggling Enable SAML/SSO.

Next, add the following information:

FieldDescription
Email DomainsProvided by your company (likely IT);.Team members on the email domains used to be able to log in via SAML/SSO
Branded Login DomainProvided by your company (likely IT). Where your users will be able to log in to Branch. Typically your company name.

Lowercase letters, numbers, underscores, and dashes only.
Identity provider Entity IDProvided by your IdP. The URL of your IdP (SAML 2.0).
Identity provider SSO URLProvided by your IdP. The SAML endpoint from your identity provider.
Public x509 certificateProvided by your IdP. Copy/paste this from your IdP from when you added Branch.

Click Save.

3. Add Users to Branch in Your IdP

Give the appropriate users access to Branch in your identity provider. When you add users to Branch via your IdP, you will also have to add them to the team for the appropriate apps in the Branch Dashboard. You can do this on the Account Settings > Team page for each app that you want the user to have access to.

❗️

Users on Branch But Not Your IdP

Single Sign-On (SSO) authentication is applied according to the user's email domain. For team members under your email domain listed in the Branch Dashboard, access must be granted via your Identity Provider (IdP). If these users are not authorized in the IdP, they will be unable to access the Branch Dashboard once SSO is activated.

Users with email domains not associated with your organization will continue to use the standard login procedure.

SSO is now enabled and users will have to login via your branded subdomain. When users on your claimed email domain(s) try to log in, reset their password, or sign up the regular way via https://dashboard.branch.io, they will be redirected to your branded subdomain and your IdP login page.

FAQ


What’s Next