Enterprise Setup Guide
Deploy FAOS MCP integration across your organization with SSO, centralized configuration, and security controls.
Overviewβ
Enterprise deployment involves:
- SSO integration with your Identity Provider
- Centralized MCP configuration management
- Security policies and audit logging
- Team onboarding and training
SSO Integrationβ
Supported Identity Providersβ
| Provider | Protocol | Status |
|---|---|---|
| Okta | SAML 2.0, OIDC | Supported |
| Azure AD | SAML 2.0, OIDC | Supported |
| Google Workspace | OIDC | Supported |
| OneLogin | SAML 2.0 | Supported |
| Ping Identity | SAML 2.0, OIDC | Supported |
| Custom SAML | SAML 2.0 | Supported |
Okta Configurationβ
Step 1: Create SAML Application in Oktaβ
-
Log in to Okta Admin Console
-
Navigate to Applications β Create App Integration
-
Select SAML 2.0
-
Configure:
- App name: "FAOS"
- Single sign on URL:
https://api.faosx.ai/auth/saml/callback - Audience URI:
urn:faosx:saml - Name ID format:
EmailAddress
-
Attribute Statements:
email β user.email
firstName β user.firstName
lastName β user.lastName
groups β user.groups (optional) -
Download the IdP metadata XML
Step 2: Configure FAOS Admin Portalβ
- Log in to FAOS Admin Portal
- Navigate to Settings β Authentication β SSO
- Upload Okta metadata XML
- Configure attribute mappings
- Enable SSO
Step 3: Configure MCP for SSOβ
{
"servers": {
"faos": {
"command": "faos-mcp",
"env": {
"FAOS_API_URL": "https://api.yourcompany.faosx.ai",
"FAOS_AUTH_METHOD": "sso",
"FAOS_SSO_DOMAIN": "yourcompany.com",
"FAOS_SSO_PROVIDER": "okta"
}
}
}
}
Azure AD Configurationβ
Step 1: Register Application in Azureβ
-
Navigate to Azure Portal β Azure Active Directory
-
App registrations β New registration
-
Configure:
- Name: "FAOS MCP"
- Redirect URI:
https://api.faosx.ai/auth/oidc/callback - Supported account types: Single tenant
-
Note the Application (client) ID and Directory (tenant) ID
-
Create client secret:
- Certificates & secrets β New client secret
- Copy the secret value immediately
Step 2: Configure API Permissionsβ
Add permissions:
openidprofileemailUser.Read
Grant admin consent.
Step 3: Configure FAOSβ
Provide to FAOS support:
- Tenant ID
- Client ID
- Client Secret (securely)
Centralized Configurationβ
MDM/Configuration Managementβ
Deploy MCP configuration via your configuration management tool.
macOS (Jamf Pro)β
Create a configuration profile to deploy mcp.json to all managed devices.
Windows (Intune/GPO)β
Deploy via registry or file:
# PowerShell deployment script
$configPath = "$env:APPDATA\claude\mcp.json"
$config = @{
servers = @{
faos = @{
command = "faos-mcp"
env = @{
FAOS_API_URL = "https://api.yourcompany.faosx.ai"
FAOS_AUTH_METHOD = "sso"
FAOS_SSO_DOMAIN = "yourcompany.com"
}
}
}
}
$config | ConvertTo-Json -Depth 10 | Set-Content $configPath
Environment-Based Configurationβ
For organizations with multiple environments:
{
"servers": {
"faos-prod": {
"command": "faos-mcp",
"env": {
"FAOS_API_URL": "https://api.faosx.ai",
"FAOS_AUTH_METHOD": "sso",
"FAOS_SSO_DOMAIN": "yourcompany.com",
"FAOS_TENANT_ID": "prod-tenant"
}
},
"faos-staging": {
"command": "faos-mcp",
"env": {
"FAOS_API_URL": "https://staging-api.faosx.ai",
"FAOS_AUTH_METHOD": "sso",
"FAOS_SSO_DOMAIN": "yourcompany.com",
"FAOS_TENANT_ID": "staging-tenant"
}
}
}
}
Security Policiesβ
Network Securityβ
Firewall Allowlistβ
Allow outbound HTTPS to:
api.faosx.ai(443)*.faosx.ai(443) for CDN assets- Your SSO provider domains
Proxy Configurationβ
{
"servers": {
"faos": {
"command": "faos-mcp",
"env": {
"FAOS_API_URL": "https://api.faosx.ai",
"HTTPS_PROXY": "http://proxy.yourcompany.com:8080",
"NO_PROXY": "localhost,127.0.0.1"
}
}
}
}
Data Securityβ
Data Residencyβ
FAOS supports data residency requirements:
| Region | API URL | Data Location |
|---|---|---|
| US | api.faosx.ai | us-east-1 |
| EU | api.eu.faosx.ai | eu-west-1 |
| APAC | api.ap.faosx.ai | ap-southeast-1 |
Encryptionβ
- All data encrypted in transit (TLS 1.3)
- All data encrypted at rest (AES-256)
- Customer-managed keys available (Enterprise+)
Access Controlβ
Role-Based Accessβ
Configure in FAOS Admin Portal:
| Role | Agents | Workflows | Metrics | Graph |
|---|---|---|---|---|
| Developer | All | All | Read | Read |
| Analyst | analyst, pm | Read-only | All | All |
| Manager | All | All | All | All |
| Viewer | None | None | Read | Read |
Team Scopesβ
Restrict access by team:
{
"FAOS_TEAM_SCOPE": "engineering",
"FAOS_PROJECT_FILTER": "mobile-*"
}
Audit Loggingβ
What's Loggedβ
All MCP tool invocations are logged:
- User identity (from SSO)
- Tool name and parameters
- Response status
- Timestamp and duration
- Client metadata (app version, OS)
Accessing Audit Logsβ
Admin Portalβ
Navigate to Compliance β Audit Logs
Filter by:
- User/team
- Date range
- Tool type
- Status
API Exportβ
# Export audit logs via API
curl -H "Authorization: Bearer $ADMIN_TOKEN" \
"https://api.faosx.ai/admin/audit/export?start=2026-01-01&end=2026-01-31" \
-o audit-jan-2026.json
SIEM Integrationβ
Forward logs to your SIEM:
| SIEM | Integration |
|---|---|
| Splunk | HTTP Event Collector |
| Datadog | Log forwarding API |
| Elastic | Logstash input |
| Azure Sentinel | Azure Functions |
Configuration in Admin Portal: Integrations β Log Forwarding
Onboardingβ
Deployment Checklistβ
- SSO configured and tested
- MCP configuration deployed to all devices
- Firewall rules updated
- Audit logging verified
- Access roles defined
- Training materials distributed
Training Resourcesβ
| Resource | Audience | Duration |
|---|---|---|
| Quick Start Video | All users | 10 min |
| Agent Workshop | Power users | 1 hour |
| Admin Training | IT/Admins | 2 hours |
Support Escalationβ
| Issue Level | Contact | Response Time |
|---|---|---|
| P1 (Outage) | Dedicated Slack | 1 hour |
| P2 (Blocking) | support@faosx.ai | 4 hours |
| P3 (Question) | support@faosx.ai | 24 hours |
Complianceβ
Certificationsβ
- SOC 2 Type II
- ISO 27001
- GDPR compliant
- HIPAA compliant (Healthcare add-on)
Data Processing Agreementβ
Contact legal@faosx.ai for DPA execution.
Security Questionnaireβ
Pre-filled SIG Lite available on request.
Supportβ
Enterprise Support:
- Dedicated Slack channel
- Named support engineer
- Quarterly business reviews
Contact: enterprise@faosx.ai