Single Sign-On with SAML 2.0 for Projects
Looking for guides on how to use Single Sign-On with the Supabase dashboard? Head on over to Enable SSO for Your Organization.
Supabase Auth supports enterprise-level Single Sign-On (SSO) for any identity providers compatible with the SAML 2.0 protocol. This is a non-exclusive list of supported identity providers:
- Google Workspaces (formerly known as GSuite)
- Okta, Auth0
- Microsoft Active Directory, Azure Active Directory, Microsoft Entra
- PingIdentity
- OneLogin
If you're having issues with identity provider software not on this list, please open a support ticket.
Prerequisites
This guide requires the use of the Supabase CLI. Please make sure you're using version v1.46.4 or higher. You can use supabase -v
to see the currently installed version.
You can use the supabase sso
subcommands to manage your project's configuration.
SAML 2.0 support is disabled by default on Supabase projects. You can configure this on the Auth Providers page on your project.
Please note that SAML 2.0 support is offered on plans Pro and above. Check the Pricing page for more information.
Terminology
The number of SAML and SSO acronyms can often be overwhelming. Here's a glossary which you can refer back to at any time:
- Identity Provider, IdP, or IDP An identity provider is a service that manages user accounts at a company or organization. It can verify the identity of a user and exchange that information with your Supabase project and other applications. It acts as a single source of truth for user identities and access rights. Commonly used identity providers are: Microsoft Active Directory (Azure AD, Microsoft Entra), Okta, Google Workspaces (GSuite), PingIdentity, OneLogin, and many others. There are also self-hosted and on-prem versions of identity providers, and sometimes they are accessible only by having access to a company VPN or being in a specific building.
- Service Provider, SP This is the software that is asking for user information from an identity provider. In Supabase, this is your project's Auth server.
- Assertion An assertion is a statement issued by an identity provider that contains information about a user.
- EntityID A globally unique ID (usually a URL) that identifies an Identity Provider or Service Provider across the world.
- NameID A unique ID (usually an email address) that identifies a user at an Identity Provider.
- Metadata
An XML document that describes the features and configuration of an Identity Provider or Service Provider. It can be as a standalone document or as a URL. Usually (but not always) the
EntityID
is the URL at which you can access the Metadata. - Certificate Supabase Auth (the Service Provider) trusts assertions from an Identity Provider based on the signature attached to the assertion. The signature is verified according to the certificate present in the Metadata.
- Assertion Consumer Service (ACS) URL This is one of the most important SAML URLs. It is the URL where Supabase Auth will accept assertions from an identity provider. Basically, once the identity provider verifies the user's identity it will redirect to this URL and the redirect request will contain the assertion.
- Binding (Redirect, POST, or Artifact)
This is a description of the way an identity provider communicates with Supabase Auth. When using the Redirect binding, the communication occurs using HTTP 301 redirects. When it's
POST
, it's usingPOST
requests sent with<form>
elements on a page. When using Artifact, it's using a more secure exchange over a Redirect orPOST
. - RelayState State used by Supabase Auth to hold information about a request to verify the identity of a user.
Important SAML 2.0 information
Below is information about your project's SAML 2.0 configuration which you can share with the company or organization that you're trying to on-board.
Name | Value |
---|---|
EntityID | https://<project>.supabase.co/auth/v1/sso/saml/metadata |
Metadata URL | https://<project>.supabase.co/auth/v1/sso/saml/metadata |
Metadata URL (download) | https://<project>.supabase.co/auth/v1/sso/saml/metadata?download=true |
ACS URL | https://<project>.supabase.co/auth/v1/sso/saml/acs |
SLO URL | https://<project>.supabase.co/auth/v1/sso/slo |
NameID | Required emailAddress or persistent |
Note that SLO (Single Logout) is not supported at this time with Supabase Auth as it is a rarely supported feature by identity providers. However, the URL is registered and advertised for when this does become available.
Append ?download=true
to the Metadata URL to download the Metadata XML file. This is useful in cases where the identity provider requires a file.
Alternatively, you can use the supabase sso info --project-ref <your-project>
command to get setup information for your project.
User accounts and identities
User accounts and identities created via SSO differ from regular (email, phone, password, social login...) accounts in these ways:
- No automatic linking.
Each user account verified using a SSO identity provider will not be automatically linked to existing user accounts in the system. That is, if a user
[email protected]
had signed up with a password, and then uses their company SSO login with your project, there will be two[email protected]
user accounts in the system. - Emails are not necessarily unique. Given the behavior with no automatic linking, email addresses are no longer a unique identifier for a user account. Please always use the user's UUID to correctly reference user accounts.
- Sessions may have a maximum duration. Depending on the configuration of the identity provider, a login session established with SSO may forcibly log out a user after a certain period of time.
Row Level Security
You can use information about the SSO identity provider in Row Level Security policies.
Here are some commonly used statements to extract SSO related information from the user's JWT:
auth.jwt()#>>'{amr,0,method}'
Returns the name of the last method used to verify the identity of this user. With SAML SSO this issso/saml
.auth.jwt()#>>'{amr,0,provider}'
Returns the UUID of the SSO identity provider used by the user to sign-in.auth.jwt()#>>'{user_metadata,iss}'
Returns the identity provider's SAML 2.0EntityID
If you use Multi-Factor Authentication with SSO, the amr
array may have a different method at index 0
!
A common use case with SSO is to use the UUID of the identity provider as the identifier for the organization the user belongs to -- frequently known as a tenant. By associating the identity provider's UUID with your tenants, you can use restrictive RLS policies to scope down actions and data that a user is able to access.
For example, let's say you have a table like:
_10create table organization_settings (_10 -- the organization's unique ID_10 id uuid not null primary key,_10 -- the organization's SSO identity provider_10 sso_provider_id uuid unique,_10 -- name of the organization_10 name text,_10 -- billing plan (paid, Free, Enterprise)_10 billing_plan text_10);
You can use the information present in the user's JWT to scope down which rows from this table the user can see, without doing any additional user management:
_10CREATE POLICY "View organization settings."_10 ON organization_settings_10 AS RESTRICTIVE_10 USING (_10 sso_provider_id = (select auth.jwt()#>>'{amr,0,provider}')_10 );
Managing SAML 2.0 connections
Once you've enabled SAML 2.0 support on your project via the Auth Providers page in the dashboard, you can use the Supabase CLI to add, update, remove and view information about identity providers.
Add a connection
To establish a connection to a SAML 2.0 Identity Provider (IdP) you will need:
- A SAML 2.0 Metadata XML file, or a SAML 2.0 Metadata URL pointing to an XML file
- (Optional) Email domains that the organization's IdP uses
- (Optional) Attribute mappings between the user properties of the IdP and the claims stored by Supabase Auth
You should obtain the SAML 2.0 Metadata XML file or URL from the organization whose IdP you wish to connect. Most SAML 2.0 Identity Providers support the Metadata URL standard, and we recommend using a URL if this is available.
Commonly used SAML 2.0 Identity Providers that support Metadata URLs:
- Okta
- Azure AD (Microsoft Entra)
- PingIdentity
Commonly used SAML 2.0 Identity Providers that only support Metadata XML files:
- Google Workspaces (GSuite)
- Any self-hosted or on-prem identity provider behind a VPN
Once you've obtained the SAML 2.0 Metadata XML file or URL you can establish a connection with your project's Supabase Auth server by running:
_10supabase sso add --type saml --project-ref <your-project> \_10 --metadata-url 'https://company.com/idp/saml/metadata' \_10 --domains company.com
If you wish to use a Metadata XML file instead, you can use:
_10supabase sso add --type saml --project-ref <your-project> \_10 --metadata-file /path/to/saml/metadata.xml \_10 --domains company.com
This command will register a new identity provider with your project's Auth server. When successful, you will see the details of the provider such as it's SAML information and registered domains.
Please note that only persons with write access to the project can register, update or remove identity providers.
Once you've added an identity provider, users who have access to it can sign in to your application. With SAML 2.0 there are two ways that users can sign in to your project:
- By signing-in from your application's user interface, commonly known as SP (Service Provider) Initiated Flow
- By clicking on an icon in the application menu on the company intranet or identity provider page, commonly known as Identity Provider Initiated (IdP) Flow
To initiate a sign-in request from your application's user interface (i.e. the SP Initiated Flow), you can use:
_10supabase.auth.signInWithSSO({_10 domain: 'company.com',_10})
Calling signInWithSSO
starts the sign-in process using the identity provider registered for the company.com
domain name. It is not required that identity providers be assigned one or multiple domain names, in which case you can use the provider's unique ID instead.
Understanding attribute mappings
When a user signs in using the SAML 2.0 Single Sign-On protocol, an XML document called the SAML Assertion is exchanged between the identity provider and Supabase Auth.
This assertion contains information about the user's identity and other authentication information, such as:
- Unique ID of the user (called
NameID
in SAML) - Email address
- Name of the user
- Department or organization
- Other attributes present in the users directory managed by the identity provider
With exception of the unique user ID, SAML does not require any other attributes in the assertion. Identity providers can be configured so that only select user information is shared with your project.
Your project can be configured to recognize these attributes and map them into your project's database using a JSON structure. This process is called attribute mapping, and varies according to the configuration of the identity provider.
For example, the following JSON structure configures attribute mapping for the email
and first_name
user identity properties.
_10{_10 "keys": {_10 "email": {_10 "name": "mail"_10 },_10 "first_name": {_10 "name": "givenName"_10 }_10 }_10}
When creating or updating an identity provider with the Supabase CLI you can include this JSON as a file with the --attribute-mapping-file /path/to/attribute/mapping.json
flag.
For example, to change the attribute mappings to an existing provider you can use:
_10supabase sso update <provider-uuid> --project-ref <your-project> \_10 --attribute-mapping-file /path/to/attribute/mapping.json
Given a SAML 2.0 assertion that includes these attributes:
_21<saml:AttributeStatement>_21 <!-- will be mapped to the email key -->_21 <saml:Attribute_21 Name="mail"_21 NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"_21 >_21 <saml:AttributeValue xsi:type="xs:string">_21 </saml:AttributeValue>_21 </saml:Attribute>_21_21 <!-- will be mapped to the first_name key -->_21 <saml:Attribute_21 Name="givenName"_21 NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"_21 >_21 <saml:AttributeValue xsi:type="xs:string">_21 Jane Doe_21 </saml:AttributeValue>_21 </saml:Attribute>_21</saml:AttributeStatement>
Will result in the following claims in the user's identity in the database and JWT:
_10{_10 "email": "[email protected]",_10 "custom_claims": {_10 "first_name": "Jane Doe"_10 }_10}
Supabase Auth does not require specifying attribute mappings if you only need access to the user's email. It will attempt to find an email attribute specified in the assertion. All other properties will not be automatically included, and it is those you need to map.
At this time it is not possible to have users without an email address, so SAML assertions without one will be rejected.
Most SAML 2.0 identity providers use Lightweight Directory Access Protocol (LDAP) attribute names. However, due to their variability and complexity operators of identity providers are able to customize both the Name
and attribute value that is sent to Supabase Auth in an assertion. Please refer to the identity provider's documentation and contact the operator for details on what attributes are mapped for your project.
Accessing the stored attributes
The stored attributes, once mapped, show up in the access token (a JWT) of the user. If you need to look these values up in the database, you can find them in the auth.identities
table under the identity_data
JSON column. Identities created for SSO providers have sso:<uuid-of-provider>
in the provider
column, while id
contains the unique NameID of the user account.
Furthermore, you can find the same identity data under raw_app_meta_data
inside auth.users
.
Remove a connection
Once a connection to an identity provider is established, you can remove it by running:
_10supabase sso remove <provider-id> --project-ref <your-project>
If successful, the details of the removed identity provider will be shown. All user accounts from that identity provider will be immediately logged out. User information will remain in the system, but it will no longer be possible for any of those accounts to be accessed in the future, even if you add the connection again.
If you need to reassign those user accounts to another identity provider, please open a support ticket.
A list of all registered identity providers can be displayed by running:
_10supabase sso list --project-ref <your-project>
Update a connection
You may wish to update settings about a connection to a SAML 2.0 identity provider.
Commonly this is necessary when:
- Cryptographic keys are rotated or have expired
- Metadata URL has changed, but is the same identity provider
- Other SAML 2.0 Metadata attributes have changed, but it is still the same identity provider
- You are updating the domains or attribute mapping
You can use this command to update the configuration of an identity provider:
_10supabase sso update <provider-id> --project-ref <your-project>
Please use --help
to see all available flags.
It is not possible to change the unique SAML identifier of the identity provider, known as EntityID
. Everything else can be updated. If the SAML EntityID
of your identity provider has changed, it is regarded as a new identity provider and you will have to register it like a new connection.
Retrieving information about a connection
You can always obtain a list of all registered providers using:
_10supabase sso list --project-ref <your-project>
This list will only include basic information about each provider. To see all of the information about a provider you can use:
_10supabase sso show <provider-id> --project-ref <your-project>
You can use the -o json
flag to output the information as JSON, should you need to. Other formats may be supported, please use --help
to see all available options.
Frequently asked questions
How do I publish my application to an identity provider's marketplace?
Many cloud-based identity providers offer a marketplace where you can register your application for easy on-boarding with customers. When you use Supabase Auth's SAML 2.0 support you can register your project in any one of these marketplaces.
Please refer to the relevant documentation for each cloud-based identity provider on how you can do this. Some common marketplaces are:
- Okta Integration Network
- Azure Active Directory App Gallery
- Google Workspaces Pre-integrated SAML apps catalog
Why do some users get: SAML assertion does not contain email address?
Identity providers do not have to send back and email address for the user, though they often do. Supabase Auth requires that an email address is present.
The following list of commonly used SAML attribute names is inspected, in order of appearance, to discover the email address in the assertion:
urn:oid:0.9.2342.19200300.100.1.3
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
http://schemas.xmlsoap.org/claims/EmailAddress
mail
email
Finally if there is no such attribute, it will use the SAML NameID
value but only if the format is advertised as urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
.
Should you run into this problem, it is most likely a misconfiguration issue on the identity provider side. Please instruct your contact at the company to map the user's email address to one of the above listed attribute names, typically email
.
How do I access the private key used for SAML in my project?
At this time it is not possible to extract the RSA private key used by your project's Supabase Auth server. This is done to keep the private key as secure as possible, given that SAML does not offer an easy way to rotate keys without disrupting service. (Please use a SAML 2.0 Metadata URL whenever possible for this reason!)
If you really need access to the key, please open a support ticket and we'll try to support you as best as possible.
Is multi-tenant SSO with SAML supported?
Yes, Supabase supports multi-tenant Single Sign-On (SSO) using SAML 2.0. While the dashboard displays only one SAML field, you can set up multiple SAML connections using the Supabase CLI.
Each connection is assigned a unique sso_provider_id
, which is included in the user's JWT and can be used in Row Level Security (RLS) policies. You can configure custom attribute mappings for each connection to include tenant-specific information, such as roles.
This setup allows you to implement multi-tenant SSO for multiple clients or organizations within a single application. For example, if you have an app with multiple clients using different Azure Active Directories, you can create separate SAML connections for each and use the sso_provider_id
to manage access and apply appropriate security policies.