Skip to main content

Enterprise Setup Guide

Deploy FAOS MCP integration across your organization with SSO, centralized configuration, and security controls.

Overview​

Enterprise deployment involves:

  1. SSO integration with your Identity Provider
  2. Centralized MCP configuration management
  3. Security policies and audit logging
  4. Team onboarding and training

SSO Integration​

Supported Identity Providers​

ProviderProtocolStatus
OktaSAML 2.0, OIDCSupported
Azure ADSAML 2.0, OIDCSupported
Google WorkspaceOIDCSupported
OneLoginSAML 2.0Supported
Ping IdentitySAML 2.0, OIDCSupported
Custom SAMLSAML 2.0Supported

Okta Configuration​

Step 1: Create SAML Application in Okta​

  1. Log in to Okta Admin Console

  2. Navigate to Applications β†’ Create App Integration

  3. Select SAML 2.0

  4. Configure:

    • App name: "FAOS"
    • Single sign on URL: https://api.faosx.ai/auth/saml/callback
    • Audience URI: urn:faosx:saml
    • Name ID format: EmailAddress
  5. Attribute Statements:

    email    β†’ user.email
    firstName β†’ user.firstName
    lastName β†’ user.lastName
    groups β†’ user.groups (optional)
  6. Download the IdP metadata XML

Step 2: Configure FAOS Admin Portal​

  1. Log in to FAOS Admin Portal
  2. Navigate to Settings β†’ Authentication β†’ SSO
  3. Upload Okta metadata XML
  4. Configure attribute mappings
  5. Enable SSO

Step 3: Configure MCP for SSO​

{
"servers": {
"faos": {
"command": "faos-mcp",
"env": {
"FAOS_API_URL": "https://api.yourcompany.faosx.ai",
"FAOS_AUTH_METHOD": "sso",
"FAOS_SSO_DOMAIN": "yourcompany.com",
"FAOS_SSO_PROVIDER": "okta"
}
}
}
}

Azure AD Configuration​

Step 1: Register Application in Azure​

  1. Navigate to Azure Portal β†’ Azure Active Directory

  2. App registrations β†’ New registration

  3. Configure:

    • Name: "FAOS MCP"
    • Redirect URI: https://api.faosx.ai/auth/oidc/callback
    • Supported account types: Single tenant
  4. Note the Application (client) ID and Directory (tenant) ID

  5. Create client secret:

    • Certificates & secrets β†’ New client secret
    • Copy the secret value immediately

Step 2: Configure API Permissions​

Add permissions:

  • openid
  • profile
  • email
  • User.Read

Grant admin consent.

Step 3: Configure FAOS​

Provide to FAOS support:

  • Tenant ID
  • Client ID
  • Client Secret (securely)

Centralized Configuration​

MDM/Configuration Management​

Deploy MCP configuration via your configuration management tool.

macOS (Jamf Pro)​

Create a configuration profile to deploy mcp.json to all managed devices.

Windows (Intune/GPO)​

Deploy via registry or file:

# PowerShell deployment script
$configPath = "$env:APPDATA\claude\mcp.json"
$config = @{
servers = @{
faos = @{
command = "faos-mcp"
env = @{
FAOS_API_URL = "https://api.yourcompany.faosx.ai"
FAOS_AUTH_METHOD = "sso"
FAOS_SSO_DOMAIN = "yourcompany.com"
}
}
}
}
$config | ConvertTo-Json -Depth 10 | Set-Content $configPath

Environment-Based Configuration​

For organizations with multiple environments:

{
"servers": {
"faos-prod": {
"command": "faos-mcp",
"env": {
"FAOS_API_URL": "https://api.faosx.ai",
"FAOS_AUTH_METHOD": "sso",
"FAOS_SSO_DOMAIN": "yourcompany.com",
"FAOS_TENANT_ID": "prod-tenant"
}
},
"faos-staging": {
"command": "faos-mcp",
"env": {
"FAOS_API_URL": "https://staging-api.faosx.ai",
"FAOS_AUTH_METHOD": "sso",
"FAOS_SSO_DOMAIN": "yourcompany.com",
"FAOS_TENANT_ID": "staging-tenant"
}
}
}
}

Security Policies​

Network Security​

Firewall Allowlist​

Allow outbound HTTPS to:

  • api.faosx.ai (443)
  • *.faosx.ai (443) for CDN assets
  • Your SSO provider domains

Proxy Configuration​

{
"servers": {
"faos": {
"command": "faos-mcp",
"env": {
"FAOS_API_URL": "https://api.faosx.ai",
"HTTPS_PROXY": "http://proxy.yourcompany.com:8080",
"NO_PROXY": "localhost,127.0.0.1"
}
}
}
}

Data Security​

Data Residency​

FAOS supports data residency requirements:

RegionAPI URLData Location
USapi.faosx.aius-east-1
EUapi.eu.faosx.aieu-west-1
APACapi.ap.faosx.aiap-southeast-1

Encryption​

  • All data encrypted in transit (TLS 1.3)
  • All data encrypted at rest (AES-256)
  • Customer-managed keys available (Enterprise+)

Access Control​

Role-Based Access​

Configure in FAOS Admin Portal:

RoleAgentsWorkflowsMetricsGraph
DeveloperAllAllReadRead
Analystanalyst, pmRead-onlyAllAll
ManagerAllAllAllAll
ViewerNoneNoneReadRead

Team Scopes​

Restrict access by team:

{
"FAOS_TEAM_SCOPE": "engineering",
"FAOS_PROJECT_FILTER": "mobile-*"
}

Audit Logging​

What's Logged​

All MCP tool invocations are logged:

  • User identity (from SSO)
  • Tool name and parameters
  • Response status
  • Timestamp and duration
  • Client metadata (app version, OS)

Accessing Audit Logs​

Admin Portal​

Navigate to Compliance β†’ Audit Logs

Filter by:

  • User/team
  • Date range
  • Tool type
  • Status

API Export​

# Export audit logs via API
curl -H "Authorization: Bearer $ADMIN_TOKEN" \
"https://api.faosx.ai/admin/audit/export?start=2026-01-01&end=2026-01-31" \
-o audit-jan-2026.json

SIEM Integration​

Forward logs to your SIEM:

SIEMIntegration
SplunkHTTP Event Collector
DatadogLog forwarding API
ElasticLogstash input
Azure SentinelAzure Functions

Configuration in Admin Portal: Integrations β†’ Log Forwarding


Onboarding​

Deployment Checklist​

  • SSO configured and tested
  • MCP configuration deployed to all devices
  • Firewall rules updated
  • Audit logging verified
  • Access roles defined
  • Training materials distributed

Training Resources​

ResourceAudienceDuration
Quick Start VideoAll users10 min
Agent WorkshopPower users1 hour
Admin TrainingIT/Admins2 hours

Support Escalation​

Issue LevelContactResponse Time
P1 (Outage)Dedicated Slack1 hour
P2 (Blocking)support@faosx.ai4 hours
P3 (Question)support@faosx.ai24 hours

Compliance​

Certifications​

  • SOC 2 Type II
  • ISO 27001
  • GDPR compliant
  • HIPAA compliant (Healthcare add-on)

Data Processing Agreement​

Contact legal@faosx.ai for DPA execution.

Security Questionnaire​

Pre-filled SIG Lite available on request.


Support​

Enterprise Support:

  • Dedicated Slack channel
  • Named support engineer
  • Quarterly business reviews

Contact: enterprise@faosx.ai