Authentication options overview
| Method | Plans | Best for | Key features |
|---|---|---|---|
| Email & Password | All | Basic auth | Built-in, no setup required |
| Google Sign-In | All | Google Workspace users | Quick setup, 2FA support |
| LDAP | All | On-premise directories | Active Directory integration |
| SAML | Pro, Enterprise | Enterprise SSO | Full IdP integration, attribute sync |
| JWT | Pro, Enterprise | Custom SSO | Flexible token-based auth |
Google Sign-In
Enable one-click authentication using Google accounts.When to use Google Sign-In
- Your organization uses Google Workspace
- You want Google’s 2FA/MFA for Metabase security
- You need simple SSO without enterprise IdP complexity
Setting up Google Sign-In
Create Google OAuth credentials
- Go to Google Developer Console
- Create a new project or select existing
- Enable Google+ API
- Create OAuth 2.0 credentials
Configure authorized origins
Auto-account creation with domain restriction
Auto-account creation with domain restriction
yourcompany.com) to automatically create accounts for users with matching email domains.Users with @yourcompany.com emails can sign in and automatically get Metabase accounts.Multiple domains
LDAP authentication
Integrate with Lightweight Directory Access Protocol directories like Active Directory.Required LDAP attributes
Your LDAP directory must have these attributes:| Attribute | Default LDAP field | Required? |
|---|---|---|
mail | Yes | |
| First name | givenName | No (defaults to “Unknown”) |
| Last name | sn | No (defaults to “Unknown”) |
Configuring LDAP
Server settings
- Host: e.g.,
ldap.yourdomain.org - Port: Usually 389 (standard) or 636 (SSL)
- Security: None, SSL, or StartTLS
- Admin username: Distinguished name for binding
- Admin password: Credentials for admin user
User schema
- User search base: Starting DN (e.g.,
ou=People,dc=widgetco,dc=com) - User filter: Query to match users (default works for most)
Understanding user search base
Understanding user search base
dc=widgetco,dc=com, and employees are under an organizational unit called “People”, set:Default user filter explained
Default user filter explained
- Have objectClass of
inetOrgPersonAND - Match the login in either the
uidORmailfield
LDAP group mapping
Automatically add users to Metabase groups based on LDAP group membership.- Administrator group can be mapped like any other group
- Group membership updates only apply after users log in again
- Only mapped groups are affected—other Metabase groups remain unchanged
Advanced LDAP features
Group membership filter
Group membership filter
{dn}: Replaced with user’s Distinguished Name{uid}: Replaced with user’s UID
Syncing user attributes from LDAP
Syncing user attributes from LDAP
- Row and column security
- Personalized data filtering
- Multi-tenant analytics
SAML authentication
Benefits of SAML authentication
- Automatic account provisioning on first login
- User attribute synchronization for row-level security
- Seamless access without re-authentication
- Centralized identity management
- Support for all major identity providers
Supported identity providers
Metabase provides specific guides for:- Auth0
- Microsoft Entra ID (Azure AD)
- Keycloak
- Okta
- OneLogin and other SAML 2.0 providers
Before setting up SAML
SAML configuration overview
The SAML setup form has three sections:Metabase information for your IdP
- URL the IdP should redirect back to: Your Metabase URL +
/auth/sso - User attributes: Email, first name, last name
IdP information for Metabase
- SAML Identity Provider URL: Where Metabase redirects login requests
- SAML Identity Provider Issuer: Unique IdP identifier (recommended)
- SAML Identity Provider Certificate: X.509 certificate for verification
Understanding the redirect URL
Understanding the redirect URL
[Your Metabase Site URL]/auth/ssoExample: If your Site URL is https://metabase.yourcompany.com, the redirect URL is:- Auth0: “Application Callback URL”
- Okta: “Single Sign On URL”
- OneLogin: “ACS (Consumer) URL”
User attributes mapping
User attributes mapping
- Email address
- First name
- Last name
Certificate configuration
Certificate configuration
.cer or .pem filesInclude headers: Copy the entire certificate including:SAML group synchronization
Automatically assign Metabase groups based on IdP attributes.Create IdP user attribute
metabaseGroups)Create mappings
- Click Create a mapping
- Enter the IdP group value
- Select corresponding Metabase group(s)
- Click Save
SAML Single Logout (SLO)
Enable single logout to sign users out of both Metabase and your IdP. SLO endpoint:/auth/sso/handle_slo
Full URL example:
MB_SAML_SLO_ENABLED=trueMB_SAML_IDENTITY_PROVIDER_URIset to IdP’s SLO endpointMB_SESSION_COOKIE_SAMESITE=none- HTTPS must be enabled
User provisioning with SAML
By default, Metabase creates accounts automatically when users authenticate via SAML. If using SCIM user provisioning, disable automatic account creation to control who can access Metabase through SCIM instead.JWT authentication
JWT authentication flow
Configuring JWT
JWT group mapping
Automate group assignments based on JWT claims.Configure in Metabase UI
Configure in Metabase UI
Configure via environment variables
Configure via environment variables
extHR,extSalesare JWT group names7,3,4are Metabase group IDs
/admin/people/groups/<ID>Multi-tenant JWT configuration
For multi-tenant applications, JWT can automatically assign users to tenants based on token claims. See Tenants documentation.Password authentication
Disabling password login
To require SSO for all users:Password complexity requirements
Enforce stronger password policies from Admin > Settings > Authentication. Options include:- Minimum length
- Required character types (uppercase, lowercase, numbers, symbols)
- Common password prevention
Session expiration
Control how long users stay logged in before re-authentication is required. Configure in Admin > Settings > Authentication > Session expiration.Account provisioning
Automatic account creation
All authentication methods can automatically create Metabase accounts on first login:- User account with email and name from IdP
- Membership in mapped groups (if configured)
- No password (must continue using SSO)
New account notifications
Admins receive email notifications when SSO creates new accounts. To disable these notifications:- Go to Admin > Settings > Authentication > User provisioning
- Toggle off Notify admins of new users provisioned from SSO
SCIM user provisioning
- Centralized user lifecycle management
- Automatic deprovisioning
- Group membership sync
- Integration with identity platforms
Best practices
Test SSO before disabling passwords
Troubleshooting
Cannot log in after SSO setup
Cannot log in after SSO setup
SAML certificate errors
SAML certificate errors
- Certificate includes header and footer comments
- No extra spaces or line breaks
- Certificate hasn’t expired
- Correct certificate was copied
User attributes not syncing
User attributes not syncing
- Attribute names match exactly (case-sensitive)
- IdP is sending attributes in assertions
- User has logged in after attribute configuration
- Attribute values are correct format
Group mappings not working
Group mappings not working
- Group names match exactly
- User has logged in after mapping setup
- IdP is sending group information
- Metabase groups exist before mapping
LDAP connection fails
LDAP connection fails
- Firewall allows connections to LDAP port
- Admin credentials are correct
- User search base DN is valid
- LDAP server is accessible from Metabase