SSO Guide
You can use any Identity Provider that supports the SAML 2.0 protocol in order to authenticate users via single sign-on(SSO) on Mailtrap.
How to enable SAML SSO in Mailtrap
Only the Account Owner has access to enable/disable SAML on an account.
To enable the SAML configuration for the Mailtrap account - go to Settings > Account settings > SSO or open the SSO tab and add/edit the SAML configuration.
Step 1: Add and verify the domain:
- Enter your domain in the Domain field and click the Add Domain button.
- In the displayed table, you will find the record and its value generated by Mailtrap.
- Go to your domain settings page, select Manage DNS, and choose TXT from the list of options (for details, consult your domain provider documentation).
- Copy the authentication key generated by Mailtrap from the Value column and paste it to your TXT record.
- Once completed, get back to Mailtrap and click the Verify button for this domain. The status should change to Active.
Step 2: Configure SSO
- Choose whether you want to enforce SSO sign-in for users provisioned by SSO. When enabled, users whose sign-in is provisioned by SSO won’t be able to sign in using any method except SSO.
- Choose whether you want to create a separate free account for users provisioned by SSO. When enabled, new users won’t get a separate account. When disabled, each new user will also get a separate account in addition to the one they get via SSO. Applies to newly provisioned users only.
Step 3: Mailtrap —> Identity Provider
You'll need to provide the following to Mailtrap from your Identity Provider:
- IdP Entity ID (Identity Provider Issuer)
- Single Sign-on URL
- Optional: Single Logout Service (SLO) URL
- X509 Certificate
Step 4: Identity Provider —> Mailtrap
You’ll need to provide the following SAML Provider details to your Identity Provider from Mailtrap:
- Entity ID
- Assertion Consumer Service URL
- Single Logout Service URL
Step 5: Role mapping
You have the option to enforce IdP role mapping on every sign-in. That way, Mailtrap will fetch a new role from the IdP provider to check for any changes on its side. IdP provider should sign the user out of Mailtrap so that we can fetch the updated role attribute.