Skip to main content
SSO is available on Enterprise plans.
Enterprise admins can configure SAML SSO for Okta or Microsoft Entra directly from the Mintlify dashboard. For other providers like Google Workspace or Okta OIDC, contact us to set up SSO.

Set up SSO

Okta

1

Configure Okta SSO in your Mintlify dashboard

  1. In your Mintlify dashboard, navigate to the Single Sign-On page.
  2. Click Configure.
  3. Select Okta SAML.
  4. Copy the Single sign on URL and Audience URI.
2

Create a SAML app in Okta

  1. In Okta, under Applications, create a new app integration using SAML 2.0.
  2. Enter the following from Mintlify:
    • Single sign on URL: the URL you copied from your Mintlify dashboard
    • Audience URI: the URI you copied from your Mintlify dashboard
    • Name ID Format: EmailAddress
  3. Add these attribute statements:
    NameName formatValue
    firstNameBasicuser.firstName
    lastNameBasicuser.lastName
3

Copy the Okta metadata URL

In Okta, go to the Sign On tab of your application and copy the metadata URL.
4

Save in Mintlify

Back in the Mintlify dashboard, paste the metadata URL and click Save changes.

Microsoft Entra

1

Configure Microsoft Entra SSO in your Mintlify dashboard

  1. In your Mintlify dashboard, navigate to the Single Sign-On page.
  2. Click Configure.
  3. Select Microsoft Entra ID SAML.
  4. Copy the Single sign on URL and Audience URI.
2

Create an enterprise application in Microsoft Entra

  1. In Microsoft Entra, navigate to Enterprise applications.
  2. Select New application.
  3. Select Create your own application.
  4. Select “Integrate any other application you don’t find in the gallery (Non-gallery).”
3

Configure SAML in Microsoft Entra

  1. In Microsoft Entra, navigate to Single Sign-On.
  2. Select SAML.
  3. Under Basic SAML Configuration, enter the following:
    • Identifier (Entity ID): the Audience URI from Mintlify
    • Reply URL (Assertion Consumer Service URL): the Single sign on URL from Mintlify
Leave the other values blank and select Save.
4

Configure Attributes & Claims in Microsoft Entra

  1. In Microsoft Entra, navigate to Attributes & Claims.
  2. Select Unique User Identifier (Name ID) under “Required Claim.”
  3. Change the Source attribute to user.primaryauthoritativeemail.
  4. Under Additional claims, create the following:
    NameValue
    firstNameuser.givenname
    lastNameuser.surname
5

Copy the Microsoft Entra metadata URL

Under SAML Certificates, copy the App Federation Metadata URL.
6

Save in Mintlify

Back in the Mintlify dashboard, paste the metadata URL and click Save changes.
7

Assign users

In Microsoft Entra, navigate to Users and groups. Assign the users who should have access to your Mintlify dashboard.

JIT provisioning

When you enable JIT (just-in-time) provisioning, users who sign in through your identity provider are automatically added to your Mintlify organization. To enable JIT provisioning, you must have SSO enabled. Navigate to the Single Sign-On page in your dashboard, set up SSO, and then enable JIT provisioning.

Change or remove SSO provider

  1. Navigate to the Single Sign-On page in your dashboard.
  2. Click Configure.
  3. Select your preferred SSO provider or no SSO.
If you remove SSO, users must authenticate with a password, magic link, or Google OAuth instead.

Other providers

For providers other than Microsoft Entra or Okta SAML, contact us to configure SSO.

Google Workspace (SAML)

1

Create an application

  1. In Google Workspace, navigate to Web and mobile apps.
  2. Select Add custom SAML app from the Add app dropdown.
Screenshot of the Google Workspace SAML application creation page with the "Add custom SAML app" menu item highlighted
2

Send us your IdP information

Copy the provided SSO URL, Entity ID, and x509 certificate and send it to the Mintlify team.
Screenshot of the Google Workspace SAML application page with the SSO URL, Entity ID, and x509 certificate highlighted. The specific values for each of these are blurred out.
3

Configure integration

On the Service provider details page, enter the following:
  • ACS URL (provided by Mintlify)
  • Entity ID (provided by Mintlify)
  • Name ID format: EMAIL
  • Name ID: Basic Information > Primary email
Screenshot of the Service provider details page with the ACS URL and Entity ID input fields highlighted.
On the next page, enter the following attribute statements:
Google Directory AttributeApp Attribute
First namefirstName
Last namelastName
Once this step is complete and users are assigned to the application, let our team know and we’ll enable SSO for your account.

Okta (OIDC)

1

Create an application

In Okta, under Applications, create a new app integration using OIDC. Choose the Web Application application type.
2

Configure integration

Select the authorization code grant type and enter the Redirect URI provided by Mintlify.
3

Send us your IdP information

Navigate to the General tab and locate the client ID and client secret. Securely provide these to us along with your Okta instance URL (for example, <your-tenant-name>.okta.com). You can send these via a service like 1Password or SendSafely.