Single Sign-On (SSO) Integration Guide for External Applications
Single Sign-On (SSO) Process Between external applications and MTT Platform.
The SSO mechanism is designed for external application → MTT platform login flow, not the other way around. Both flows - new user registration (via /v1/accounts → retrieve oneTimeToken → /manager/login/co/with-token) and existing user login (via /manager/mtr-login → receive co-auth cookie) - follow the same pattern:
- The user starts in an external application (e.g., Client Office or CRM).
- The application sends a background API request to either create an account or log in.
- The response includes a token (either one-time or persistent).
- The user is redirected to the MTT platform with the
co-authcookie already set. - The user is automatically logged in to the platform without re-entering credentials.
Flow for new user registrations:
Flow for existing users:
Maintaining the session: The co-auth token is valid for 15 minutes, in order to refresh the token you can send Platform-API ‘Refresh token’ request. By sending a POST request, users can obtain a new token, ensuring continued access to the platform without interruption, especially when the token is nearing expiration. The refresh token is included as a cookie to facilitate this process.
Important Note: External app and the MTT platform must be set up on the same domain (or sub-domains of the same domain) for this SSO process to work seamlessly, as cookies can only be shared within the same domain structure.
What made this section unhelpful for you?
On this page
- Single Sign-On (SSO) Integration Guide for External Applications