Figma - SSO configuration

Figma - SSO configuration

Alert
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk.
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Figma using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
Warning
To set up Multi-Pass with  Figma, ensure you meet the following requirements:
- Figma admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Figma are registered in your IdP and have the necessary permissions to access Figma.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.



Figma - SSO configuration




Step 1 - Figma Configuration

  1. Log into Figma as an Administrator.
  2. Go to Admin and click on Settings
  3. In Login and Provisioning
  4. Select Authentication.
  5. Ensure authentication is set to Members may log in with any available method (default).
  6. Click SAML SSO.
  7. Copy the Tenant ID (needed later).
NotesNote the values for ACS URL, Entity ID, and Start URL (they contain the Tenant ID).

SP - Figma SAML Values (Will be needed in MPAS)
FieldValue
ACS URLhttps://www.figma.com/saml/<TENANT_ID>/acs
Entity IDhttps://www.figma.com/saml/<TENANT_ID>
Start URLhttps://www.figma.com/saml/<TENANT_ID>/login
Tenant ID<TENANT_ID>
  1. Click Edit configuration
  2. In the Identity provider (IdP) section, select Other
  3. and complete the fields by importing the SAML metadata from MPAS or with the information below  :
    1. IdP Entity ID = https://ca.auth.kzero.com/realms/<TENANT_NAME>
    2. IdP SSO Target URL = https://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml
    3. For Signing certificate, click Choose file (You will download it in MPAS in the step below) 
  4. Click Review
  5. Check the This information is correct box.
  6. Click Configure SAML SSO.

Step 2 - Multi-Pass Configuration

  1. Open Multi-Pass Dashboard

  1. Select your tenant and click on Integrations
  2. Select Applications.
  3. Choose SAML under Custom Integrations.

  1. Enter the values from Figma (ACS URL, Entity ID, Start URL)
SAML — Form values (Multi-Pass)
FieldValue
Client ID (= Entity ID)https://www.figma.com/saml/<TENANT_ID>
NameFigma
  Description
  SSO integration
Assertion Consumer Service URLhttps://www.figma.com/saml/<TENANT_ID>/acs
NameID Policy Formatemail
  1. Download Tenant certificate (will be uploaded into Figma).

  1. Click Add Integration.
  2. Go to the advanced console by clicking on the left side of your screen

  1. Click on Client and use the search bar to look for Figma. 
  2. Click on the line and verify the following section : 
General settings
FieldValue
Client IDhttps://www.figma.com/saml/<TENANT_ID>
NameFigma
 Description
 SSO integration
Always Display in UION

Access settings
FieldValue
  Home URL
Valid Redirect URIs (ACS)https://www.figma.com/saml/<TENANT_ID>/acs
IdP-Initiated URL<APP_Name>

SAML Capabilities
SettingValue
  Name ID format
 Email 
Force NameID FormatON
Force POST BindingON
Include AuthnStatementON

Signature & Encryption
SettingValue
Sign DocumentsOFF
Sign AssertionsON
  1. Move to the tab called "Keys" and make sure both parameters are switched to OFF
  2. Then move to the "advanced" tab
    1. Assertion Consumer Service POST Binding URL = Valid Redirect URIs (ACS) = https://www.figma.com/saml/<TENANT_ID>/acs
  3. Now move to the tab "Client scope" 
  4. Click on the first line 
  5. Click on configure a new mapper

  1. Select User Attribute and complete the form


familyName
FieldValue
Mapper TypeUser Attribute
NamefamilyName
User AttributelastName
Friendly NamefamilyName
SAML Attribute Name / OIDC ClaimfamilyName

givenName
FieldValue
Mapper TypeUser Attribute
NamegivenName
User AttributefirstName
Friendly NamegivenName
SAML Attribute Name / OIDC ClaimgivenName


Step 3 - Testing the Integration

  1. Create a test user in Figma.
  2. Create the same test user in Multi-Pass with identical email.
  3. Test login via SSO from the Figma login page.
  4. Validate that attributes (email, firstName, lastName, title, groups if applicable) are correctly passed.

    • Related Articles

    • SAML SSO Integration Guide

      This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
    • Notion - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
    • Vanta - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Vanta using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Dynatrace - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Dynatrace using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Addigy - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Addigy using MPAS. SSO simplifies user authentication by allowing access to multiple ...