Braintree Single Sign-On (SSO) Integration Guide


OverviewAnchorIcon

Braintree supports SAML 2.0-based Single Sign-On (SSO), allowing users to log in through your organization's identity provider.

  • Users are created, edited, suspended, and managed in the Braintree Control Panel

  • Users log in via your IdP -> No password on our site. 

  • Users suspended in the IdP will be denied access to Braintree but will still appear active in the Control Panel unless manually suspended or deleted

  • We support SP-Initiated SSO, or when users begin login at Braintree

  • We also support IdP-Initiated SSO, where users begin login from their IdP dashboard



Required Setup ValuesAnchorIcon

FieldExampleNotes
Merchant ID1ab2cdefghij4kl5Found in the Control Panel URL after /merchants/
Email Domain(s)@yourcompany.comList all domains used for user login. Any users with an email address NOT listed will NOT be able to login. 
SSO HTTP POST Binding URLhttps://idp.example.com/saml2/sso/postThe SAML callback/POST endpoint from your IdP
X.509 Certificate<?xml version="1.0" ... >For validating SAML responses
💡 You'll receive the Audience/Callback URL from Braintree once the above details are shared with us and we can setup your SSO configuration on our side. You'll need this for setting up SSO on your IdP.  

Optional ValuesAnchorIcon

FieldExampleNotes
Logout Redirect URLhttps://idp.example.com/saml2/sso/logoutDefaults to your SSO POST Binding URL if not provided

When reaching out to Braintree to enable SSO, please include all of the above values. We cannot onboard you without them. 


IdP-Side Configuration DetailsAnchorIcon

These are values you'll need to configure in your IdP’s SAML settings:

FieldDescription
Audience Value (Entity ID)Provided by Braintree
ACS URL (Assertion Consumer Service)Same as Audience Value
Recipient / Callback URLSame as Audience Value
NameID FormatEmail/Email address
NameID ValueUser's email address

Step-by-Step Setup (Any IdP)AnchorIcon

  1. Submit a request to your CSM/TAM or via Braintree support with:

    • Merchant ID

    • Email domains

    • SSO Certificate (If using Okta, you won't have these until you start the below onboarding section)

    • SSO HTTP Post-Binding URL (If using Okta, you won't have these until you start the below onboarding section)

  2. Braintree will respond with your SSO Callback URL (e.g., https://id.sandbox.braintreegateway.com/sso/callback/UUID)

Okta AnchorIcon

  1. In Okta:

    • Go to ApplicationsBrowse Catalog

    • Search and select Braintree

    • Add the app and use the UUID from your Callback URL for the "BT SSO Partial Callback URI"

    • Set the SCIM endpoint:

      • Sandbox: sandbox.id.braintreegateway.com

      • Production: id.braintreegateway.com

  2. Configure SAML settings:

    • Navigate to the `Sign-On` tab

    • Click `Edit` in the top right

    • Application username format: email 

    • Update application username on: create and update 

    • Leave everything else default 

    • Save

  3. After saving:

    • Go to Sign-OnView Setup Instructions

    • Copy the Sign-On URL and Signing Certificate

    • Send them to your Braintree contact

    • We will use these values to update your SSO config on our side. We will also enable SSO for your BT merchant. 

  4. Test login via `Post-Configuration Steps` 


OneLogin AnchorIcon

  1. In the Admin portal, go to AppsAdd App

  2. Search for and select SAML Test Connector (Advanced): https://support.onelogin.com/kb/4266907/saml-custom-connector-advanced

  3. App name: Braintree

  4. Configuration tab:

    • ACS URL: Provided by Braintree

    • Entity ID: Provided by Braintree

  5. Parameters tab:

    • Add parameter email → Map to Email

  6. SSO tab:

    • Download metadata or copy the metadata URL

  7. Share metadata and email domain info with Braintree Support

  8. Test login using OneLogin or https://id.braintreegateway.com


Microsoft Entra ID (Azure AD)AnchorIcon

     Guide from Entra: https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/add-application-portal-setup-sso

  1. In Azure PortalEnterprise Applications+ New Application

  2. Choose “Integrate any other application you don’t find in the gallery”

  3. App name: Braintree

  4. Under Single Sign-On → Choose SAML

  5. Input configuration:

    • Identifier (Entity ID): Provided by Braintree

    • Reply URL (ACS): Provided by Braintree

  6. Attributes & Claims:

    • emailuser.mail

  7. Download Federation Metadata XML

  8. Send metadata and SSO details to Braintree Support

  9. Test login via Azure Dashboard or Braintree SSO URL, details in the section below. 


Post-Configuration StepsAnchorIcon

Once Braintree confirms setup:

  • Add an existing Braintree user's corresponding IdP user to the new SSO app you just setup.

  • On the BT control panel, go to said user's user page (ex: https://sandbox.braintreegateway.com/merchants/yzv4t9j9vjdtk5ym/users/kr3hvmqvqrdt9gs9)

  • Click `Enable` under `Single Sign-On`. If you do not see a `Single-Sign On` section for the user page, please contact us. We might have forgotten to enable SSO for your merchant on our side. 

  • Wait up to five minutes for the caches to update. 

  • Have the user try to login both via the IdP (a new tile with the app name should now appear in their homepage) and via our SSO login page https://id.sandbox.braintreegateway.com/sso/sessions/new

  • Once test is complete and working, enable SSO for remaining users via the “Enable SSO” button on each user's detail page. For organizations with many users, Braintree offers a one-time mass SSO enablement option. For this, please reach out to us and give us a csv with the list of users you want SSO-enabled. Please include their email address in the CSV.