Managing SAML SSO access to MailSlurp organizations

Setup team enterprise access using identity providers such as AD, Okta, OneLogin and more. Secure email account sharing with MFA.

MailSlurp enterprise accounts support login and user management using an identity provider such as Azure, Active Directory, OneLogin, Auth0, Okta etc. to manage team shared email inboxes.

SAML setup overview

  • Upgrade your account to an enterprise plan to enable the SAML single sign on feature.
  • Create an organization inside the MailSlurp dashboard.
  • Configure an identity provider service such as Okta or ActiveDirectory.
  • Add a new SAML 2.0 application connection for MailSlurp in your identity provider and obtain the following:
    • Issuer
    • Entrypoint URL
    • X509 Public Certificate
  • Inside MailSlurp application create new SAML Settings for your organization. Add the issuer, entrypoint, and x509 certificate to your MailSlurp organization. Optionally add Authncontext for active directory.
  • On your identity provider add users to MailSlurp integration. Do not invite users via the invite page on the MailSlurp organization dashboard - use your IdP to manage users.
  • Direct users to their SAML login page hosted at https://enterprise.mailslurp.com/login?slug=your-organization-slug or the link shown on your organization admin page in the MailSlurp dashboard.

Example Okta tutorial

Please follow the IdP setup guide for Okta and other identity providers.

User access and management

Resource management and billing

Organization user resources and tracked against the administrators account. All non-admin user resources are shared across the organization.

Further reading