Finding your Base44 app ID and redirect URI
Before you start setting up SSO for your app, you need to find your Base44 app ID and create your redirect URI. To find your Base44 app ID:- Open your app editor in Base44.
-
Look at the browser URL. It should look something like this:
-
The string after
/apps/and before/editor/is your app ID. In this example: -
You need this ID to build your redirect URI. Replace the APP_ID in the link below with your actual Base44 app ID.
In this example, your redirect URI would be:
Setting up SSO for:
Choose your provider to start setting up SSO.- Go to Google Cloud console.
- Click APIs & services.
- Click Credentials.
- Click Create credentials.
- Cick Create OAuth 2.0 client ID.
- Select Web application.
- Enter a name.
- Scroll down to Authorized redirect URIs.
- Click Add URI.

- Enter your redirect URI.
Make sure to replace the APP_ID with your actual Base44 app ID.
- Click Data Access and go to Scopes.
-
During the OAuth consent screen setup, you’ll see a section to Add or remove scopes. These scopes allow Base44 to identify the user and access their email address after login. Use the search bar to find and select the following:
openidhttps://www.googleapis.com/auth/userinfo.email
- Click Create.
- Copy the client ID and client secret.
- In Base44, click Dashboard in your app editor.
- Click Settings.
- Click Authentication.
- Click Single sign-on (SSO).
- Enter the client ID and client secret.
-
Click Save SSO Settings.

Microsoft
(Azure / Entra ID)- Go to the Azure portal.
- Click Azure Active Directory.
- Click App registrations.
-
Click New registration.

-
Register your app by completing the form:
- Enter the name.
- Select the account type.
- Click the Select a platform drop-down and select Web.
-
Enter your redirect URI:
Make sure to replace the APP_ID with your actual Base44 app ID.

-
Go to Certificates and secrets and select New client secret.

-
Go to API permissions and add the following scopes to allow Base44 to authenticate users and access their basic profile and email address:
emailopenidprofileUser.Read

-
Copy the client ID, client secret, and discovery URL.
- Single tenant: use your Azure tenant-specific URL
- Multi-tenant or customer: Use this URL:
- In Base44, click Dashboard in your app editor.
- Click Settings.
- Click Authentication.
- Click Single sign-on (SSO).
- Enter the client ID, client secret and discovery URL.
- Click Save SSO Settings.
GitHub
- Go to GitHub Developer Settings.
-
Click NewAuth App under OAuth apps.

-
Fill out the form using the details:
- Application name: e.g. “Base44 login”
-
Authorization callback URL:
Make sure to replace the APP_ID with your actual Base44 app ID.

- Copy the client ID and client secret.
- In Base44, click Dashboard in your app editor.
- Click Settings.
- Click Authentication.
- Click Single sign-on (SSO).
- Enter the client ID and client secret.
-
Click Save SSO Settings.

Okta
-
Go to your Okta admin dashboard.
https://<your-okta-domain>.okta.com/admin - Click Applications.
- Click Applications .
- Click Create app integration.
-
Select the following settings:
- OIDC - OpenID Connect
-
Web application

- Click Next.
-
In the app settings enter the following details:
- **App name: **YourApp Okta Login
-
Sign-in redirect URI

-
Add the following scopes:

- Copy the client ID, client secret, andIssuer URL (this becomes your discovery URL).
- In Base44, click Dashboard in your app editor.
- Click Settings.
- Click Authentication.
- Click Single sign-on (SSO).
-
Enter the client ID, client secret and discovery URL.

- Click Save SSO Settings.
Testing that SSO works
After saving your settings, follow these steps to make sure single sign-on is working as expected:- Log out of your app if you are currently signed in.
- Go to your app’s login screen.
- Click Log in with SSO (or choose the provider you set up).
- Sign in using an email address from your verified domain.
FAQs
Click a question to learn more about SSO.Do I need to set up SSO if I only use one login?
Do I need to set up SSO if I only use one login?
No, SSO is optional. You can continue using your existing login method if it works for you. But if you’d like your team to log in with Google, Microsoft, GitHub, or Okta, SSO are available.
What is a redirect URI and where do I use it?
What is a redirect URI and where do I use it?
A redirect URI is a special link that tells your identity provider (like Google or Microsoft) where to send users after they log in. You’ll enter this when setting up SSO in your provider’s dashboard. It should look like this:
Make sure to replace the APP_ID in the link above with your actual Base44 app ID.
What is a discovery URL? Do I need to add it?
What is a discovery URL? Do I need to add it?
A discovery URL is a link that tells Base44 how to connect to your identity provider. It helps Base44 automatically find the right settings, like where to send users to log in and where to get their info after they do.You’ll only need to use this with some providers:
- For Google, you don’t need to do anything. Base44 handles it automatically behind the scenes.
- For Microsoft (Azure) and Okta, your provider will give you a discovery URL. You’ll just need to copy it and paste it into the Discovery URL field in your Base44 SSO settings.
- If you’re using GitHub, you can leave the discovery URL field blank as it’s not needed.
Note: If your provider gives you a discovery URL, you’ll paste it into the “Discovery URL” field in your Base44 SSO settings. If not, you can leave it blank.
What if I see an error when logging in?
What if I see an error when logging in?
Double-check the following:
- Your redirect URI exactly matches what you entered in your provider’s dashboard
- Your client ID, client secret, and (if applicable) discovery URL are correct
- The scopes you added include at least:
openidandemail
Why does the Google login still show "base44.com" instead of my app name after setting up custom SSO?
Why does the Google login still show "base44.com" instead of my app name after setting up custom SSO?
If your Google login still shows “base44.com” as the badge or app name, it means your Google project has not yet been approved. Once your custom Google project is approved by Google, your own app name or branding will appear during the login process. Until then, Base44’s default Google login is used.
How can I make sure my app name appears in the Google login instead of "base44.com"?
How can I make sure my app name appears in the Google login instead of "base44.com"?
To display your own app name during Google sign-in, finish setting up your custom SSO, publish the app, and submit your Google project for approval. After Google approves your project, your chosen app name or branding will appear instead of “base44.com.”