How to Configure SAML 2.0 for Hugging Face Enterprise Hub
Prerequisites:
- Your organization must be on an Enterprise or Enterprise Plus plan to enable SAML-based Single Sign-On (SSO).
- You must have administrator privileges in both your Okta organization and your Hugging Face Enterprise Hub organization.
- Ensure your Hugging Face organization has a unique Organization Name and Organization ID. You will find these under Organization Settings → SSO → SAML.
- Have your Okta Identity Provider (IdP) metadata available, including:
- Identity Provider Single Sign-On URL
- X.509 Certificate (full text including BEGIN/END markers)
- For more information about Hugging Face’s Enterprise SSO, see:
Hugging Face Enterprise SSO Documentation.
Contents
Supported Features
The Okta / Hugging Face Enterprise Hub SAML integration supports the following features:
- IdP-initiated SSO: Users can sign in to Hugging Face directly from the Okta dashboard.
- SP-initiated SSO: Users accessing Hugging Face content are redirected to Okta for authentication.
Configuration Steps
Step 1 — Add the Hugging Face App from Okta Integration Network (OIN)
- Sign in to your Okta Admin Console.
- Navigate to Applications → Browse App Catalog.
- Search for Hugging Face and click Add Integration.
Step 2 — Configure the Hugging Face App in Okta
- On the General Settings page, specify:
- Application label: Hugging Face
- Organization Name: Your Hugging Face organization name
- Organization ID: Your Hugging Face organization ID
Where to find these values: In Hugging Face, go to Organization Settings → SSO → SAML.

- Click Next, review the sign-on options (the username format should be Email), and then click Done.
- Important: Ensure the administrator performing these steps is assigned to the Hugging Face app in Okta under the Assignments tab.
Step 3 — Copy SAML Configuration from Okta
- In the Hugging Face app in Okta, open the Sign On tab.
- Locate the SAML 2.0 section and click View SAML Setup Instructions.
- Copy the following values:
- Identity Provider Single Sign-On URL
- X.509 Certificate — copy the full text including -----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----.
Step 4 — Configure SAML in Hugging Face
- In Hugging Face, navigate to Organization Settings → SSO → SAML.
- Enter the values obtained from Okta:
- Sign On URL: Paste the Identity Provider Single Sign-On URL.
- X.509 Certificate: Paste the certificate including BEGIN/END markers.
- Click Update and Test SAML Configuration.
- If the test succeeds, toggle Enable SAML SSO to activate SSO for your organization.
SP-Initiated SSO
Hugging Face also supports SP-initiated Single Sign-On. To initiate login directly from Hugging Face:
- Navigate to https://huggingface.co/organizations/{organizationName}/sso
- You’ll be redirected to Okta to authenticate, and then returned to your Hugging Face organization workspace.
This flow can also occur automatically when accessing restricted organization content — users will be prompted with a “Login with SSO” banner that redirects to Okta.
Notes
- This setup describes Standard SSO. For Advanced SSO (with SCIM user provisioning and additional network security controls), see
Advanced SSO Documentation.
- Ensure that the Organization Name and Organization ID used in Okta exactly match those in Hugging Face SSO settings.
- After enabling SAML, access to organization resources will require authentication through Okta.
Customer Support Contact
For assistance with SSO setup or troubleshooting, please contact the Hugging Face Enterprise Support team: