Setting Up Single Sign-On (SSO) for Granola
This guide walks you through configuring SAML-based Single Sign-On with Granola. We support all major identity providers including Okta, Microsoft Entra ID (formerly Azure AD), and others.Overview
To complete SSO setup, you’ll need to:- Create a SAML application in your identity provider using the credentials we’ve provided
- Configure the required attribute statements
- Send us your IdP Metadata URL
Your SSO Credentials
We’ve provided the following values in our email. You’ll need these when configuring your identity provider:- SP Entity ID (also called “Audience URI” or “Identifier”) - A unique identifier for Granola’s SAML configuration
- ACS URL (Assertion Consumer Service URL, also called “Reply URL” or “Single Sign-On URL”) - The URL where your identity provider sends authentication responses
Configuration Instructions
- Okta
- Microsoft Entra ID
Create the SAML Application
- Log in to your Okta Admin dashboard
- Go to Applications → Create App Integration
- Select SAML 2.0 and click Next
- Enter a name (e.g., “Granola”) and click Next
- In the Configure SAML step:
- Set Single Sign-On URL to the ACS URL we provided
- Set Audience URI (SP Entity ID) to the SP Entity ID we provided
- Click Next, and then Finish
Configure Attribute Statements
You should now be on the Sign On tab for your app. Scroll down to the Attribute Statements section and click Show legacy configuration, then add the following mappings:| Name | Value |
|---|---|
id | user.id |
email | user.email |
firstName | user.firstName |
lastName | user.lastName |
groups and filter “Matches regex”: .*
Click Save on the attribute statements.Get the Metadata URL
- Make sure you’re still on the Sign On tab
- Under SAML 2.0 > Metadata details, click Copy on the Metadata URL
What Happens Next
Once you send us the Metadata URL, we’ll verify the configuration and enable SSO for your workspace. After that, users with matching email domains will be prompted to sign in via SSO.Troubleshooting
Users can’t sign in
- Verify users are assigned to the SAML application in your identity provider
- Check that the email addresses in your IdP match the email domain configured for SSO
Attribute errors
- Ensure all required attribute statements are configured exactly as shown above
- For Entra ID, verify the claim names match what Granola expects

