SAML via Azure AD
Updated over a week ago

What Is SAML?

SAML is an important security standard that allows Taskade users to log in securely without remembering and managing multiple passwords. SAML can be set up with Okta, Azure AD, Google Workspace, and other identity providers. Follow the instructions below to configure SAML for your organization.

πŸ’‘ Note: If your team is already using Taskade, your identity provider will take ownership of those accounts. Please inform your team before enabling SAML.

Configure with Azure AD

  • Requirements

    • Important: This should be configured by your IT department.

    • The main account must be set up with a company email address.

    • Personal email accounts are not allowed.

    • Your email must be verified.

    • This feature is only available on our Ultimate and Enterprise plans.

The first step is to create an organization available on the settings page. An organization allows you to manage multiple workspaces and enables group provisioning.


After creating your organization on Taskade, navigate to your Azure Portal and follow the steps below:





As of this moment, Taskade is not available in the Azure AD gallery. In the Create your own application menu, select Integrate any other application you don't find in the gallery. When you're done, click Create at the bottom of the panel.


The next step is configuring the Single sign-on for the newly added application.


Make sure to select SAML as the authentication method.



In the Basic SAML Configuration panel, use the following values:

Identifier (Entity ID)

Reply URL (Assertion Consumer Service URL)

Sign-on URL (Optional)


Click Save at the top left corner of the Basic SAML Configuration panel. Next, scroll down to SAML Certificates and click Edit.


You have to create a new certificate and use the Sign SAML response and assertion option for the Signing Option. Click Save to create the certificate.

In the next step, you will need to activate the new certificate.

Click the three dots (Β·Β·Β·) on the right and select Make certificate active. Finally, download the Base64 certification. You will need the certificate in the next step.,


Close the SAML Signing Certificate panel and scroll to Set up Taskade (step 4) of the Single Sign-On configuration page.


You will need to copy these values to Taskade, so keep this window open and navigate back to your organization. In the SAML SSO page, paste the SSO URL, IDP Issuer, and the Base64 Certificate from the previous step. You can open the certificate file with any text editor.

πŸ’‘ Note: Type "" in the DOMAIN field. For other fields, use the details from the table below.

Azure AD


Login URL


Azure AD Identifier

IDP Issuer

Base64 Certificate (copy using a text editor)

IDP Public Signing Cert


❗️ Important: You must select 1 default workspace. When your team authenticates via SSO, they can access the default workspace's home folder. Treat the home folder as a lobby for your team. Access to all other folders within your workspace requires manual invites or changing team access.

Once you're done, scroll down and click Save. If you've experienced any errors up until this point, please email us at [email protected].

The last and final step is to ensure your Single Sign-On has been configured correctly. Navigate to your Azure Portal and click Test under the Test single sign-on with Taskade. Then click Test sign in as the current user.



You'll be redirected to where you'll log in using your Azure credentials. If the test is successful, anyone in your Active Directory assigned to the application can sign up or sign in to Taskade.

If you require further assistance with this configuration, please email us at [email protected], and we'll be more than happy to help set this up for you.

😊 Helpful Links

Did this answer your question?