docs-mintlify/admin/sso/okta/saml.mdx
With SAML (Security Assertion Markup Language) enabled, you can authenticate users in Cube Cloud through Okta, allowing your team to access Cube Cloud using single sign-on.
<Note>Available on Enterprise plan.
</Note>Before proceeding, ensure you have the following:
First, enable SAML authentication in Cube Cloud:
After the application is created, configure attribute statements to map user attributes from Okta to Cube Cloud:
| Name | Expression |
|---|---|
email | user.profile.email |
name | user.profile.firstName |
Next, retrieve the values you'll need to complete the configuration in Cube Cloud:
Return to the SAML configuration page in Cube Cloud and provide the identity provider details:
Auto-provisioned users — both via SAML and via SCIM — receive the Viewer role by default. To assign a different role, expand the Advanced section of the SAML configuration form and pick from Default role for new users:
The selected role applies only when a user is first created during
provisioning. Existing users are not modified on subsequent SSO logins or
SCIM updates. It is applied in addition to any roles your identity
provider sends via the role attribute (subject to the rolesMap).
Admin status is not assignable through this picker — Admin is controlled separately. To grant admin permissions, update the user's role manually under Admin → Users.
</Info> <Warning>If the selected role is later renamed or deleted, new users will fall back to the Viewer role until you pick a valid role here. The Viewer fallback applies whenever the configured default cannot be resolved — whether that's because no default is set or the configured role no longer exists.
</Warning>