Single sign-on guides

How to setup SAML SSO for MailSlurp using your favourite identity provider.

MailSlurp enterprise account plans support single sign-on using the SAML protocol. You can configure your corporate identity provider (such as Okta) to connect users with the MailSlurp dashboard application.

Common provider integrations

Please see the guides below for integrations with common providers.

Step-by-step guide

Enabling single sign on in MailSlurp requires an external identity provider and an enterprise MailSlurp subscription.

1) Create a MailSlurp account

First you must create a MailSlurp account.

2) Upgrade to an Enterprise account

Then upgrade to an enterprise plan to enable teams.

3) Create an organization in MailSlurp

MailSlurp organizations allow team access to inboxes with access several roles. Create an organization by clicking Settings > Team in the sidebar. Add your organization name and slug then click save.

Create org

The organization slug is a unique identifier for your integration

Save org

4) Click configure SAML settings

On the organization page click Configure SAML settings to create a SAML connection.

Create SAML settings

The SAML settings page provides the MailSlurp service provider ACS URL, the audience URI, and the name format. Copy these values into your IDP application integration.

5) Copy identity provider setup to your Idp

Open you identity provider and create a new SAML application integration.

  • Add the SSO URL (ACS): https://enterprise.mailslurp.com/saml/<YOUR_SLUG>
  • Use same value for audience SP-ID: https://enterprise.mailslurp.com/saml/<YOUR_SLUG>
  • For name ID format use emailAddress

Save the integration in your Idp. In Okta this looks like so:

Okta edit SAML

6) Copy Idp integration details into MailSlurp SAML SSO settings

Once you add the application to your identity provider you must copy the SAML endpoint, issuer and X509 certificate into the MailSlurp SSO settings panel so that MailSlurp can connect to your Idp integration.

  • Fill the SAML endpoint URL in MailSlurp
  • Fill the identity provider issuer
  • Add the X.509 certificate

If you are using Okta you can find these details by clicking the View SAML setup instruction button:

Setup SAML in Okta

Save the SAML SSO settings in MailSlurp in the SAML SSO Settings form.

SAML settings

7) Direct users to login page

Once your SAML settings are saved you can direct your organization users to login via the enterprise portal

  • https://enterprise.mailslurp.com/login?slug=<YOUR_SLUG>

Managing user access