Bland supports OIDC-based Single Sign-On (SSO) for enterprise workspaces. This enables your users to authenticate with their existing identity provider (IdP) — such as Google Workspace, Okta, or Azure Active Directory — instead of managing separate Bland credentials.
Once connected, users from your domain can log in with Sign in with SSO, and new users will be provisioned automatically into your workspace.
Leave the authorized redirect URI field blank for now — you’ll return to this after creating your provider in Bland, where the required URI (including the Provider ID) will be generated.
Click Create
Copy the Client ID and Client Secret
Use https://accounts.google.com as your Issuer URL
Once created:
Navigate to the SSO tab in your Bland workspace settings
Click Create New Provider
Fill in the domain, issuer URL, and your new client credentials
After creation, copy the Provider ID
Return to your Google OAuth client and add the redirect URI using your Provider ID
Leave the Sign-in Redirect URI empty for now — after creating your provider in Bland, you’ll receive a full redirect URI with your Provider ID to paste here.
Click Save
Copy the Client ID and Client Secret
Use your issuer URL in the format: https://<yourOktaDomain>/oauth2/default
Then:
Go to the SSO tab in Bland
Create a new provider with your domain, issuer, and credentials
Copy the Provider ID
Return to Okta and add the redirect URI using that Provider ID
Under Redirect URI, select Web and leave it empty for now — you’ll fill it in after creating your provider in Bland, which will generate the full URI using your Provider ID.
Click Register
In the app overview, copy the Application (client) ID (this is your Client ID)
Go to Certificates & Secrets → New client secret to generate your Client Secret
Your Issuer URL is typically: https://login.microsoftonline.com/<tenant_id>/v2.0
And your OIDC metadata document: https://login.microsoftonline.com/<tenant_id>/v2.0/.well-known/openid-configuration
After that:
Go to the SSO tab in Bland
Create your provider and input the client ID, secret, and issuer
Copy the Provider ID
Return to Azure and add the corresponding redirect URI to your app
Users signing in via SSO will still need to verify their phone number during first-time setup.
SSO users will be automatically added to this organization with the “operator” role, unless they have an admin role defined in the SSO provider.
Each email domain can only be configured for one organization.
The redirect URI for your OIDC provider should be: https://api.bland.ai/authorization/sso/callback/[provider-id]
using the provider ID from the table above. Whitelist this URI after connecting the provider to Bland.