docs-mintlify/admin/sso/okta/saml.mdx
With SAML (Security Assertion Markup Language) enabled, you can authenticate users in Cube Cloud through Okta, allowing your team to access Cube Cloud using single sign-on.
<Note>Available on Enterprise plan.
</Note>Before proceeding, ensure you have the following:
First, enable SAML authentication in Cube Cloud:
After the application is created, configure attribute statements to map user attributes from Okta to Cube Cloud:
In your SAML app integration, go to the Sign On tab.
Scroll down to the Attribute statements section.
Click Add expression and create the following entries:
| Name | Expression |
|---|---|
email | user.profile.email |
name | user.profile.firstName |
If you plan to map Cube roles based on Okta group membership (see Map roles by group below), also add a Group Attribute Statement. Scroll to the Group Attribute Statements section and add:
| Name | Filter |
|---|---|
groups | Matches regex .* |
Adjust the filter to scope which groups Okta sends — e.g.
Starts with cube- to limit the assertion to Cube-related groups.
The attribute name must match the Groups attribute value configured
in Cube Cloud (defaults to groups).
Next, retrieve the values you'll need to complete the configuration in Cube Cloud:
Return to the SAML configuration page in Cube Cloud and provide the identity provider details:
Auto-provisioned users — both via SAML and via SCIM — receive the Viewer role by default. To assign a different role, expand the Advanced section of the SAML configuration form and pick from Default role for new users:
The selected role applies only when a user is first created during
provisioning. Existing users are not modified on subsequent SSO logins or
SCIM updates. It is applied in addition to any roles your identity
provider sends via the role attribute (subject to the rolesMap).
Admin status is not assignable through this picker — Admin is controlled separately. To grant admin permissions, update the user's role manually under Admin → Users.
</Info> <Warning>If the selected role is later renamed or deleted, new users will fall back to the Viewer role until you pick a valid role here. The Viewer fallback applies whenever the configured default cannot be resolved — whether that's because no default is set or the configured role no longer exists.
</Warning>For finer-grained role assignment, enable Map roles by group in the Advanced Settings section to assign Cube Cloud roles based on a user's Okta group memberships.
To configure group-based role mapping:
groups.How it's applied:
The same groupsRolesMap is also consumed by SCIM when groups
are pushed and members are added, so a single configuration drives both
SAML SSO and SCIM group sync.
The legacy rolesMap setting (a translation from raw IdP role values to
Cube role names, applied to the Role attribute) continues to work
and is applied in addition to groupsRolesMap. They read different
SAML attributes (role vs. groups) and can be used side by side.