Okta SAML SSO Integration
Configure SAML-based Single Sign-On (SSO) with Okta for MintMCP authentication.
Prerequisites
Before configuring Okta SAML integration, ensure you have:
- Okta admin account access
- Access to your organization's Okta dashboard
Step 1: Contact MintMCP Support
Contact MintMCP Support to request SAML SSO setup for your organization. Our team will:
- Create a dedicated organization in our system for your company
- Configure the SAML connection on our backend
- Provide you with the required SAML configuration parameters:
- ACS URL (Assertion Consumer Service URL)
- SP Entity ID (Service Provider Entity ID)
- IdP Metadata URL endpoint
Please include your company name and primary contact information when requesting setup.
Step 2: Create SAML Application in Okta
- Log into your Okta admin dashboard
- Navigate to Applications → Applications
- Click Create App Integration
- Select SAML 2.0 as the sign-on method
- Click Next
General Settings
- App name: Enter "MintMCP" or your preferred application name
- App logo: Optionally upload your company logo
- Click Next
Step 3: Configure SAML Settings
SAML Settings Configuration
Enter the following values provided by MintMCP Support:
- Single sign-on URL: Paste the ACS URL from MintMCP Support
- Audience URI (SP Entity ID): Paste the SP Entity ID from MintMCP Support
- Default RelayState: Leave blank
- Name ID format: Unspecified
Attribute Statements
Add the following attribute mappings to ensure proper user data flow:
Name | Name format | Value |
---|---|---|
id | Unspecified | user.id |
email | Unspecified | user.email |
firstName | Unspecified | user.firstName |
lastName | Unspecified | user.lastName |
Group Attribute Statements (Optional)
If you want to map Okta groups to MintMCP roles:
Name | Name format | Filter |
---|---|---|
groups | Unspecified | Matches regex .* |
Click Next to continue.
Step 4: Feedback and Assignments
- Select I'm an Okta customer adding an internal app
- Click Finish
Assign Users to Application
- Go to the Assignments tab in your new MintMCP application
- Click Assign → Assign to People or Assign to Groups
- Select the users or groups that should have access to MintMCP
- Click Assign and then Done
Step 5: Send Metadata URL to MintMCP Support
- In your Okta application, go to the Sign On tab
- Locate the Metadata URL in the SAML 2.0 section
- Copy this URL
- Send the Metadata URL to MintMCP Support
- Our team will update your SAML connection with this metadata
Step 6: Test the Integration
Once MintMCP Support confirms the configuration is complete:
- MintMCP Support will provide you with a test login URL
- Navigate to the test URL
- You should be redirected to Okta for authentication
- After successful login, you'll be redirected back to MintMCP
- Verify that your user information appears correctly in MintMCP
Support
For troubleshooting SAML configuration issues:
- Okta-specific issues: Check Okta's SAML troubleshooting documentation
- All other issues: Contact MintMCP Support for assistance