This guide is for organisations that have created a custom SAML 2.0 app from scratch in Okta — not the pre-built Lusha app from the Okta Integration Network. If you added Lusha directly from the Okta app gallery, use How to set up SSO (single sign-on) instead.
At the end of these steps you'll have a working SSO connection. Step 3 covers exactly where to find the XML metadata file Lusha needs — the part most people get stuck on.
Only Lusha Admins or Managers can enable SSO. You'll also need admin access to your Okta organisation.
Before you start
Have these values ready — you'll enter both into Okta during setup:
Single sign-on URL (ACS URL): https://dashboard-services.lusha.com/v2/sso-saml
Audience URI (SP Entity ID): https://dashboard-services.lusha.com/v2/sso-saml
Step 1: Create a SAML 2.0 app in Okta
Sign in to your Okta Admin Console.
Go to Applications → Applications, then click Create App Integration.
Select SAML 2.0 as the sign-in method and click Next.
Enter an app name (for example: "Lusha") and click Next.
Step 2: Configure SAML settings
Under Configure SAML, fill in the following fields:
Single sign-on URL: https://dashboard-services.lusha.com/v2/sso-saml
Audience URI (SP Entity ID): https://dashboard-services.lusha.com/v2/sso-saml
Name ID format: EmailAddress
Application username: Email
Scroll to Attribute Statements and add these three rows:
Name: email | Format: Unspecified | Value: user.email
Name: firstName | Format: Unspecified | Value: user.firstName
Name: lastName | Format: Unspecified | Value: user.lastName
The attribute names must be lowercase and exactly as shown — Lusha's SAML parser is case-sensitive.
Click Next. Select I'm an Okta customer adding an internal app, then click Finish.
Step 3: Get your XML metadata from Okta
This is where most users get stuck. Here is exactly where to find the XML file:
On the app page, click the Sign On tab.
Scroll to SAML Signing Certificates.
Click Actions next to the active certificate → select View IdP metadata. The raw XML opens in a new browser tab.
Select all (Ctrl+A on Windows, Cmd+A on Mac) and copy the content.
If you don't see an active certificate, click Generate new certificate in that section, set it to active, then repeat the steps above.
Step 4: Connect to Lusha
Go to your Lusha dashboard → Account and Settings.
Enable the Custom SAML 2.0 toggle.
Paste the XML you copied from Okta into the SAML field.
Click Connect. You'll see a confirmation that the connection is active.
Step 5: Assign users in Okta
In Okta, go back to the Lusha app and click the Assignments tab.
Click Assign and choose Assign to People or Assign to Groups.
Save your assignments.
Done! Your team can now sign in to Lusha using their Okta credentials.
⚠️ Warning: If you rotate or regenerate your signing certificate in Okta, repeat Steps 3 and 4 — SSO will stop working until the updated XML is pasted into Lusha.
Related articles
How to set up SSO (single sign-on) — for the pre-built Okta Integration Network app
Custom SAML single sign-on — for other identity providers