Chuyển tới nội dung chính

Enterprise Setup Guide

Deploy FAOS MCP integration across your organization with SSO, centralized configuration, and security controls.

Overview

Enterprise deployment involves:

  1. SSO integration with your Identity Provider
  2. Centralized MCP configuration management
  3. Security policies and audit logging
  4. Team onboarding and training

SSO Integration

Supported Identity Providers

ProviderProtocolStatus
OktaSAML 2.0, OIDCSupported
Azure ADSAML 2.0, OIDCSupported
Google WorkspaceOIDCSupported
OneLoginSAML 2.0Supported
Ping IdentitySAML 2.0, OIDCSupported
Custom SAMLSAML 2.0Supported

Okta Configuration

Step 1: Create SAML Application in Okta

  1. Log in to Okta Admin Console

  2. Navigate to ApplicationsCreate App Integration

  3. Select SAML 2.0

  4. Configure:

    • App name: "FAOS"
    • Single sign on URL: https://api.faosx.ai/auth/saml/callback
    • Audience URI: urn:faosx:saml
    • Name ID format: EmailAddress
  5. Attribute Statements:

    email    → user.email
    firstName → user.firstName
    lastName → user.lastName
    groups → user.groups (optional)
  6. Download the IdP metadata XML

Step 2: Configure FAOS Admin Portal

  1. Log in to FAOS Admin Portal
  2. Navigate to SettingsAuthenticationSSO
  3. Upload Okta metadata XML
  4. Configure attribute mappings
  5. Enable SSO

Step 3: Configure MCP for SSO

{
"servers": {
"faos": {
"command": "faos-mcp",
"env": {
"FAOS_API_URL": "https://api.yourcompany.faosx.ai",
"FAOS_AUTH_METHOD": "sso",
"FAOS_SSO_DOMAIN": "yourcompany.com",
"FAOS_SSO_PROVIDER": "okta"
}
}
}
}

Azure AD Configuration

Step 1: Register Application in Azure

  1. Navigate to Azure PortalAzure Active Directory

  2. App registrationsNew registration

  3. Configure:

    • Name: "FAOS MCP"
    • Redirect URI: https://api.faosx.ai/auth/oidc/callback
    • Supported account types: Single tenant
  4. Note the Application (client) ID and Directory (tenant) ID

  5. Create client secret:

    • Certificates & secretsNew client secret
    • Copy the secret value immediately

Step 2: Configure API Permissions

Add permissions:

  • openid
  • profile
  • email
  • User.Read

Grant admin consent.

Step 3: Configure FAOS

Provide to FAOS support:

  • Tenant ID
  • Client ID
  • Client Secret (securely)

Centralized Configuration

MDM/Configuration Management

Deploy MCP configuration via your configuration management tool.

macOS (Jamf Pro)

Create a configuration profile to deploy mcp.json to all managed devices.

Windows (Intune/GPO)

Deploy via registry or file:

# PowerShell deployment script
$configPath = "$env:APPDATA\claude\mcp.json"
$config = @{
servers = @{
faos = @{
command = "faos-mcp"
env = @{
FAOS_API_URL = "https://api.yourcompany.faosx.ai"
FAOS_AUTH_METHOD = "sso"
FAOS_SSO_DOMAIN = "yourcompany.com"
}
}
}
}
$config | ConvertTo-Json -Depth 10 | Set-Content $configPath

Environment-Based Configuration

For organizations with multiple environments:

{
"servers": {
"faos-prod": {
"command": "faos-mcp",
"env": {
"FAOS_API_URL": "https://api.faosx.ai",
"FAOS_AUTH_METHOD": "sso",
"FAOS_SSO_DOMAIN": "yourcompany.com",
"FAOS_TENANT_ID": "prod-tenant"
}
},
"faos-staging": {
"command": "faos-mcp",
"env": {
"FAOS_API_URL": "https://staging-api.faosx.ai",
"FAOS_AUTH_METHOD": "sso",
"FAOS_SSO_DOMAIN": "yourcompany.com",
"FAOS_TENANT_ID": "staging-tenant"
}
}
}
}

Security Policies

Network Security

Firewall Allowlist

Allow outbound HTTPS to:

  • api.faosx.ai (443)
  • *.faosx.ai (443) for CDN assets
  • Your SSO provider domains

Proxy Configuration

{
"servers": {
"faos": {
"command": "faos-mcp",
"env": {
"FAOS_API_URL": "https://api.faosx.ai",
"HTTPS_PROXY": "http://proxy.yourcompany.com:8080",
"NO_PROXY": "localhost,127.0.0.1"
}
}
}
}

Data Security

Data Residency

FAOS supports data residency requirements:

RegionAPI URLData Location
USapi.faosx.aius-east-1
EUapi.eu.faosx.aieu-west-1
APACapi.ap.faosx.aiap-southeast-1

Encryption

  • All data encrypted in transit (TLS 1.3)
  • All data encrypted at rest (AES-256)
  • Customer-managed keys available (Enterprise+)

Access Control

Role-Based Access

Configure in FAOS Admin Portal:

RoleAgentsWorkflowsMetricsGraph
DeveloperAllAllReadRead
Analystanalyst, pmRead-onlyAllAll
ManagerAllAllAllAll
ViewerNoneNoneReadRead

Team Scopes

Restrict access by team:

{
"FAOS_TEAM_SCOPE": "engineering",
"FAOS_PROJECT_FILTER": "mobile-*"
}

Audit Logging

What's Logged

All MCP tool invocations are logged:

  • User identity (from SSO)
  • Tool name and parameters
  • Response status
  • Timestamp and duration
  • Client metadata (app version, OS)

Accessing Audit Logs

Admin Portal

Navigate to ComplianceAudit Logs

Filter by:

  • User/team
  • Date range
  • Tool type
  • Status

API Export

# Export audit logs via API
curl -H "Authorization: Bearer $ADMIN_TOKEN" \
"https://api.faosx.ai/admin/audit/export?start=2026-01-01&end=2026-01-31" \
-o audit-jan-2026.json

SIEM Integration

Forward logs to your SIEM:

SIEMIntegration
SplunkHTTP Event Collector
DatadogLog forwarding API
ElasticLogstash input
Azure SentinelAzure Functions

Configuration in Admin Portal: IntegrationsLog Forwarding


Onboarding

Deployment Checklist

  • SSO configured and tested
  • MCP configuration deployed to all devices
  • Firewall rules updated
  • Audit logging verified
  • Access roles defined
  • Training materials distributed

Training Resources

ResourceAudienceDuration
Quick Start VideoAll users10 min
Agent WorkshopPower users1 hour
Admin TrainingIT/Admins2 hours

Support Escalation

Issue LevelContactResponse Time
P1 (Outage)Dedicated Slack1 hour
P2 (Blocking)support@faosx.ai4 hours
P3 (Question)support@faosx.ai24 hours

Compliance

Certifications

  • SOC 2 Type II
  • ISO 27001
  • GDPR compliant
  • HIPAA compliant (Healthcare add-on)

Data Processing Agreement

Contact legal@faosx.ai for DPA execution.

Security Questionnaire

Pre-filled SIG Lite available on request.


Support

Enterprise Support:

  • Dedicated Slack channel
  • Named support engineer
  • Quarterly business reviews

Contact: enterprise@faosx.ai