SSO Guide

Need help setting up SSO with your specific Identity Provider? Check out our detailed step-by-step guides:

Overview

You can use any Identity Provider that supports the SAML 2.0 protocol in order to authenticate users via single sign-on (SSO) on Mailtrap.

Mailtrap automatically creates users using just-in-time provisioning when a user logs in with Mailtrap SSO.

SSO is available only for users on Enterprise plans.

How to enable SAML SSO in Mailtrap

To enable the SAML configuration for the Mailtrap account - go to Settings > Account settings > SSO to open the SSO tab and add/edit the SAML configuration.

SSO domains table showing active and pending domains with TXT record verification
1

Add and verify the domain

  • Enter your domain in the Domain field and click the Add Domain button.

  • In the displayed table, you will find the record and its value generated by Mailtrap.

  • Go to your domain settings page, select Manage DNS, and choose TXT from the list of options (for details, consult your domain provider documentation).

  • Copy the authentication key generated by Mailtrap from the Value column and paste it to your TXT record.

  • Once completed, get back to Mailtrap and click the Verify button for this domain. The status should change to Active.

2

Configure SSO

  • Choose whether you want to enforce SSO sign-in for users provisioned by SSO. When enabled, users whose sign-in is provisioned by SSO won't be able to sign in using any method except SSO.

SSO enforcement toggle enabled for designated SSO-active domains highlighted
  • Choose whether you want to create a separate free account for users provisioned by SSO. When enabled, new users won't get a separate account. When disabled, each new user will also get a separate account in addition to the one they get via SSO. Applies to newly provisioned users only.

Toggle enabled to prevent creating separate Free accounts for SSO users
3

Mailtrap → Identity Provider

You'll need to provide the following to Mailtrap from your Identity Provider:

  • IdP Entity ID (Identity Provider Issuer)

  • Single Sign-on URL

  • Optional: Single Logout Service (SLO) URL

  • X509 Certificate

4

Identity Provider → Mailtrap

You'll need to provide the following SAML Provider details to your Identity Provider from Mailtrap:

  • Entity ID

  • Assertion Consumer Service URL

  • Single Logout Service URL

5

Role mapping

SAML Role Mapping table with Admin and Viewer role attribute configurations

By default, users created in Mailtrap via SSO have roles with empty permission, so users cannot View or Edit any projects or sandboxes. In this case, you can assign permissions manually within Mailtrap User Management.

To map your IdP roles to roles in Mailtrap, you need to create a mapping in the SAML Role Mapping section in Mailtrap.

In the example above, a user with the IdP attribute "MtRoleFromAppProfile" and the name "admin" (which should be configured as Attributes in the IdP) should be assigned the "Admin" role in Mailtrap.

You have the option to enforce IdP role mapping on every sign-in. That way, Mailtrap will fetch a new role from the IdP provider to check for any changes on its side. IdP provider should sign out of Mailtrap so that we can fetch the updated role attribute.

Last updated

Was this helpful?