Skip to main content

Team accounts

Organization setup

MailSlurp supports team accounts for organizations. Team accounts allow you to create multiple users and share inboxes and email addresses and other resources between them. You can also enable SAML SSO for your team and use your existing identity provider (IdP) to manage user access.


Organization overview

Organizations are a way to group users and resources together. Organizations can be used to share inboxes, email addresses, and other resources between users. Organizations enable SAML single-sign to MailSlurp via your own identity provider (IdP).

Name and slug

Each organization has a unique slug - this is an ID that is used in login links and API calls. You can use a more descriptive name for the organization name.

User access options

Users can access an organization by logging in via email one-time codes. You can also enable SAML SSO for your organization to use your existing identity provider (IdP) to manage user access. See the SAML setup section below for more information.

Users wishing to access an organization via email access link can do so at[YOUR_SLUG]. You can disable email access in the organization settings.

email login


If you configure single sign-on (Okta, Azure AD, etc) for your organization then users will be redirected to your IdP to login. Once logged in they will be redirected back to MailSlurp with a valid session. You can initiate the login via your IdP or at[YOUR_SLUG].

enterprise login

Organization settings

You can configure organization settings to add custom branding and to disable user login via email link. This can be found on the organization overview page.

Disable email login

Logo and branding

You can configure a logo to be displayed on login screens and within the app using the organization settings page. A square icon with a background color is recommended.

Disable email login

MailSlurp allows team members to login via their email and a verification code. This can be disabled in the organization settings to ensure only SAML SSO is used for login. Disabling email login with block users like so:

Block email login

Managing organizations

You can manage organizations as the subscription holder account using the MailSlurp dashboard.

Create a team

To create an organization navigate to the organizations page in the dashboard. You can create a new organization or invite users to an existing team.

Adding additional seats

Subscription plans include a base number of user seats and additional seats can be added during upgrade on the subscription page.

Invite users

You can invite users to your organization

Managing users

You can add, edit, and remove users from your organization on the organization overview page in the dashboard.

Users table

You can also change permissions and roles.


You can configure SSO SAML login via your IdP identity provider such as Azure, Okta, Active Directory or AWS Cognito. The process can be complicated so please contact support for assistance if needed.

1. Upgrade account for SSO

Ensure you have a plan that supports SAML sign-in or follow the upgrade guide if you don't.

2. Create an organization

Create an organization in the MailSlurp app.

3. Configure SAML settings for the organization

Click the saml settings tab on the organization overview: Open saml settings

Or click the configure saml link in the access portal card:

Configure saml

4. Add the SAML service provider data to your IdP

Next you need to create an application or service provider in your identity provider to is configured for MailSlurp's identity provider endpoints. You can copy the data shown in the service provider data card on the SAML settings page, or you can download the XML file and upload it to your IdP.

SP data

In Okta for example the service provider data is added like so: Okta SAML

Then the SAML settings can be added:


5. Obtain IdP SAML data and add to MailSlurp

Now you need to get the SAML configuration from your identity provider (Okta, AD etc) and add that to the SAML configuration in MailSlurp.

In Okta the SAML data can be found like so:

IdP settings typically look like this:

Take the data and add it to the MailSlurp SAML configuration. Here is a screenshot of the app with a test IdP configured:

6. Double check entries

Make sure you enter exactly what your IdP tells you and configure AuthnContext and digest/signature algorithms as needed.

7. Save and test login

Once SAML is configured save the settings and view the organization. You will see a button to launch the SAML login screen. Click it to test your configuration.

SAML reference

Service provider meta data

Configure your application integration in your identity provider with these SAML endpoints. Be sure to add your own organization slug where indicated.

Provider namemailslurp
Name ID formaturn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
Audience URI service provider entity IDmailslurp-enterprise
Service provider metadata XML[YOUR_SLUG]
Assertion consumer service endpoint ACS URL Redirect[YOUR_SLUG]/
Assertion consumer service endpoint ACS URL Post[YOUR_SLUG]/

Okta SAML setup

Azure AD / Entra ID settings

You can configure active directory via Azure AD / Entra ID enteprise applications. Go to Entra ID in the azure portal:

Then add a new application as a non-gallery application:

On the overview page click Set up single sign on:

Then add SAML single sign on:

Then add the SAML SP data provider by MailSlurp:

Lastly, copy the IdP SAML data from Azure / Entra ID and add it to the MailSlurp SAML configuration.

** Tips: **

  • SP Binding is HTTP_POST
  • SAML 2.0 endpoint is<YOUR_TENANT_ID>/saml2
  • Identity provider issuer URL:<YOUR_ID>/
  • Digest algorithm SHA256
  • Signature algorithm SHA256
  • Add a private key for signing
  • Provision users in AD
  • Launch the application from AD