To set up Multi-Pass with Miro, ensure you meet the following requirements:
Miro admin rights (Business/Enterprise plan)
MPAS Admin rights
Make sure that all users intended to use SSO in Miro are registered in your IdP and have the necessary permissions to access Miro.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.
- Sign in to the Miro Admin Console (Enterprise/Business).
- Go to your company settings
- Go to Security, SSO/SAML (or Security → Authentication).
- Turn on SSO/SAML, then choose Add configuration.
SP Values (provided by Miro)
IdP values to enter in Miro
- make sure you have added the domain
- enable Just-in-time provisioning (JIT) and Sync user profile photos from identity provider
- Click on Save
- Open Multi-Pass Dashboard
- Select your tenant.
- Go to Integrations
- Click on Applications.
- Scroll down or use the search bar and click on the box called Miro
- You will a preconfigured settings determined to provide only that Miro's need and to let you know what you need to find from Miro.
- You will arrive on the form to complete.
Create application (form fields)
- Click on copy content to get the Key x.509 certificate required by Miro, go back to the app and paste it.
- Click on Add integration
- Now, look on the left side and click on Advanced Console.
- Select Client, search for the integration you just created.
- Verify the following parameters:
General settings
Setting | Value |
Client ID | https://miro.com/ |
Name | Miro |
Description | SSO Integration for Miro |
Always Display in UI | ON |
Access settings
SAML Capabilities — defaults if not specified
Setting | Value |
Name ID format | email |
Force Name ID Format | OFF |
Force POST Binding | ON |
Include AuthnStatement | ON |
Signature & Encryption — defaults if not specified
Setting | Value |
Sign Documents | OFF |
Sign Assertions | ON |
- Now that you have checked the different parameters, change to the tab called Keys.
- Make sure that both parameters are switched to OFF.
- Now go to the Advanced tab.
- The field Assertion Consumer Service POST Binding URL must equal the Valid Redirect URIs (ACS) = https://miro.com/sso/saml