Okta SAML SSO
Okta SAML SSO lets workspace members sign in to ElevenLabs through an Okta SAML 2.0 app integration.
SSO is available for Enterprise workspaces. Only Workspace admins can configure SSO settings.
ElevenLabs supports Service Provider (SP) initiated SAML SSO. To start sign-in, use
https://elevenlabs.io/app/sign-in?use_sso=true. You can add email=user@example.com as a query
parameter to prefill the email field.
Prerequisites
- An Enterprise ElevenLabs workspace.
- Workspace admin access in ElevenLabs.
- Admin access in Okta.
- A verified email domain in ElevenLabs for the users who will sign in through Okta.
Set up Okta SAML SSO
Select SAML as the SSO provider
In SSO Provider, select SAML. Copy the Service Provider Entity Id and Redirect URL values. You will use these values in Okta.

Create an Okta app integration
In the Okta Admin Console, go to Applications > Applications, then click Create App Integration.

Select SAML 2.0, then click Next.

Configure SAML settings in Okta
In SAML Settings, configure the app with the values from ElevenLabs:
- Set Single sign-on URL to the ElevenLabs Redirect URL.
- Select Use this for Recipient URL and Destination URL.
- Set Audience URI (SP Entity ID) to the ElevenLabs Service Provider Entity Id.
- Set Name ID format to EmailAddress.
- Set Application username to Email.

Assign users or groups
Open the Okta app’s Assignments tab and assign the users or groups that should be able to sign in to ElevenLabs.

Add the Okta certificate to ElevenLabs
In Okta, open SAML Signing Certificates and use Actions > Download certificate for the active certificate.

Open the certificate file and copy the full PEM certificate, including
-----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----.

In ElevenLabs, click Add Certificate, paste the Okta certificate, then click Add.

Copy Okta metadata values into ElevenLabs
In Okta, open the IdP metadata XML. Copy the metadata values into ElevenLabs:
- Use
entityIDfor Identity Provider Entity Id. - Use the
SingleSignOnService LocationURL that ends in/sso/samlfor Identity Provider Sign-In URL.

Field mappings
Use this table to map Okta SAML settings to ElevenLabs SSO fields.
Troubleshooting
Okta shows a successful sign-in, but ElevenLabs says unable to sign in
Check the browser Network response for accounts:signInWithIdp. Okta System Log entries such as
User single sign on to app SUCCESS only confirm that Okta authenticated the user. ElevenLabs
can still reject the SAML response if the assertion values do not match the SSO configuration.
INVALID_IDP_RESPONSE: Error when parsing certificate
The browser Network response may show INVALID_IDP_RESPONSE: Error when parsing certificate.
Remove the certificate from ElevenLabs, then re-add the Okta X.509 certificate in valid PEM
format. Do not use an LLM to format the certificate. Copy the certificate exactly, including
-----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----.
User or authentication mismatch errors
Make sure Okta sends the user’s email address as NameID. In Okta, set Name ID format to
EmailAddress and Application username to Email.
Which Okta metadata values should I use?
Use metadata entityID for Identity Provider Entity Id, SingleSignOnService Location for
Identity Provider Sign-In URL, and ds:X509Certificate for Certificate.


