MailSlurp enterprise plans support SSO SAML login. This post will demonstrate how to establish an integration with your Okta identity pool. While these steps apply to Okta they also apply to other identity providers that support SSO. This guide assumes you have created a MailSlurp organization in the dashboard app.

Prerequisites

1) Create integration in Okta

Log into your Okta or IdP account and create a new internal application pairing using SAML 2.0:

Specify SAML 2.0 for the sign in method:

2) Pick a name

Add a name and application icon if desired.

3) Add single sign-on URL (ACS)

An important step is to provide your Idp with an ACS SAML assertion URL so that you can login. For the Audience URI use the same ACS URL.

Use the slug for your organization instead of the slug shown in the images.

4) Configure name ID format

You must tell your IdP to map the email address of your user to the name ID so that MailSlurp can identify them. For name ID format use . For application username use .

5) Add issuer, certificate, and entrypoint to MailSlurp

Next view the setup instructions for your SAML integration:

  • Go to the MailSlurp dashboard organizations page and create a new SAML settings configuration.
  • Copy the certificate, issuer, and entry point from your IdP and paste them into the MailSlurp SAML settings create form.

The SAML settings can be found in Okta by click the button on the Okta integration page.

Click the view setup button to reveal the X.509 certificate, issuer, and sign on URL.

Copy these values into the MailSlurp SSO settings form on the organization page:

Save the SAML settings to enable the MailSlurp integration.

6) Login to SAML organization

Invite and manage users using your identity provider. Users can access the application at , the enterprise homescreen , or using the IdP access page.