Videos
Check out our tutorial video series.
How to Setup SAML SSO for MailSlurp with Your Favorite Identity Provider: An Easy Step-By-Step Guide for Enterprise Accounts
MailSlurp enterprise account plans support single sign-on using the SAML protocol. You can configure your corporate identity provider (such as Okta) to connect users with the MailSlurp dashboard application.
Please see the guides below for integrations with common providers.
Enabling single sign on in MailSlurp requires an external identity provider and an enterprise MailSlurp subscription.
First you must create a MailSlurp account.
Then upgrade to an enterprise plan to enable teams.
MailSlurp organizations allow team access to inboxes with access several roles.
Create an organization by clicking in the sidebar. Add your organization name and slug then click save.
The organization
is a unique identifier for your integration
On the organization page click to create a SAML connection.
The SAML settings page provides the MailSlurp service provider ACS URL, the audience URI, and the name format. Copy these values into your IDP application integration.
Open you identity provider and create a new SAML application integration.
Save the integration in your Idp. In Okta this looks like so:
Once you add the application to your identity provider you must copy the SAML endpoint, issuer and X509 certificate into the MailSlurp SSO settings panel so that MailSlurp can connect to your Idp integration.
If you are using Okta you can find these details by clicking the button:
Save the SAML SSO settings in MailSlurp in the form.
Once your SAML settings are saved you can direct your organization users to login via the enterprise portal
Check out our tutorial video series.
Email and SMS guides for automation and testing.
View github project code for multiple languages.
Latest posts from the MailSlurp team.
Test, build, and automate messaging with a free MailSlurp account.