Skip to main content

Okta SAML SSO Integration

Configure SAML-based Single Sign-On (SSO) with Okta for MintMCP authentication.

Prerequisites

Before configuring Okta SAML integration, ensure you have:

  • Okta admin account access
  • Access to your organization's Okta dashboard

Step 1: Contact MintMCP Support

Contact MintMCP Support to request SAML SSO setup for your organization. Our team will:

  1. Create a dedicated organization in our system for your company
  2. Configure the SAML connection on our backend
  3. Provide you with the required SAML configuration parameters:
    • ACS URL (Assertion Consumer Service URL)
    • SP Entity ID (Service Provider Entity ID)
    • IdP Metadata URL endpoint

Please include your company name and primary contact information when requesting setup.

Step 2: Create SAML Application in Okta

  1. Log into your Okta admin dashboard
  2. Navigate to ApplicationsApplications
  3. Click Create App Integration
  4. Select SAML 2.0 as the sign-on method
  5. Click Next

General Settings

  • App name: Enter "MintMCP" or your preferred application name
  • App logo: Optionally upload your company logo
  • Click Next

Step 3: Configure SAML Settings

SAML Settings Configuration

Enter the following values provided by MintMCP Support:

  • Single sign-on URL: Paste the ACS URL from MintMCP Support
  • Audience URI (SP Entity ID): Paste the SP Entity ID from MintMCP Support
  • Default RelayState: Leave blank
  • Name ID format: Unspecified

Attribute Statements

Add the following attribute mappings to ensure proper user data flow:

NameName formatValue
idUnspecifieduser.id
emailUnspecifieduser.email
firstNameUnspecifieduser.firstName
lastNameUnspecifieduser.lastName

Group Attribute Statements (Optional)

If you want to map Okta groups to MintMCP roles:

NameName formatFilter
groupsUnspecifiedMatches regex .*

Click Next to continue.

Step 4: Feedback and Assignments

  1. Select I'm an Okta customer adding an internal app
  2. Click Finish

Assign Users to Application

  1. Go to the Assignments tab in your new MintMCP application
  2. Click AssignAssign to People or Assign to Groups
  3. Select the users or groups that should have access to MintMCP
  4. Click Assign and then Done

Step 5: Send Metadata URL to MintMCP Support

  1. In your Okta application, go to the Sign On tab
  2. Locate the Metadata URL in the SAML 2.0 section
  3. Copy this URL
  4. Send the Metadata URL to MintMCP Support
  5. Our team will update your SAML connection with this metadata

Step 6: Test the Integration

Once MintMCP Support confirms the configuration is complete:

  1. MintMCP Support will provide you with a test login URL
  2. Navigate to the test URL
  3. You should be redirected to Okta for authentication
  4. After successful login, you'll be redirected back to MintMCP
  5. Verify that your user information appears correctly in MintMCP

Support

For troubleshooting SAML configuration issues: