Miro - SSO configuration

Miro - SSO configuration

Idea
This documentation has been tested and approved by Kelvin Zero's team
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Miro using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
Warning
To set up Multi-Pass with Miro, ensure you meet the following requirements:
Miro admin rights (Business/Enterprise plan)
MPAS Admin rights
Make sure that all users intended to use SSO in Miro are registered in your IdP and have the necessary permissions to access Miro.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.




Miro - SSO configuration





Step 1 - Configure in Miro (Service Provider)

  1. Sign in to the Miro Admin Console (Enterprise/Business).
  2. Go to your company settings 
  3. Go to SecuritySSO/SAML (or Security → Authentication).
  4. Turn on SSO/SAML, then choose Add configuration.
SP Values (provided by Miro)
FieldValue
Service Provider Entity IDhttps://miro.com/ or https://workspace-domain.miro.com/ORGANIZATION_ID
Assertion Consumer Service (ACS) URLhttps://miro.com/sso/saml or https://workspace-domain.miro.com/sso/saml/ORGANIZATION_ID

IdP values to enter in Miro
FieldValue
Identity Provider Single Sign-On URL (SAML Sign-in URL)https://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml
X.509 CertificateMPAS Certificate (See how to get it in Step 2)


  1. make sure you have added the domain
  2. enable Just-in-time provisioning (JIT) and Sync user profile photos from identity provider
  1. Click on Save

Step 2 - Configure in Multi-Pass (Identity Provider)

  1. Open Multi-Pass Dashboard

  1. Select your tenant.
  2. Go to Integrations
  3. Click on Applications.
  4. Scroll down or use the search bar and click on the box called Miro
    1. You will a preconfigured settings determined to provide only that Miro's need and to let you know what you need to find from Miro.
  1. You will arrive on the form to complete.
Create application (form fields)
FieldValue
Service Provider Entity IDhttps://miro.com/
Callback URL (= Assertion Consumer Service (ACS) URL)https://miro.com/sso/saml
SAML Sign-in URLhttps://ca.auth.kzero.com/realms/Randintegration/protocol/saml
Tenant certificate
Key x.509 Certificate
  1. Click on copy content to get the Key x.509 certificate required by Miro, go back to the app and paste it. 

  1. Click on Add integration
  2. Now, look on the left side and click on Advanced Console.
  3. Select Client, search for the integration you just created.
  4. Verify the following parameters:
General settings
SettingValue
Client IDhttps://miro.com/
NameMiro
DescriptionSSO Integration for Miro
Always Display in UION

Access settings
SettingValue
Home URLhttps://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml/clients/<APP_NAME>
Valid Redirect URIshttps://miro.com/*
IDP-Initiated SSO URL Name<APP_NAME>

SAML Capabilities — defaults if not specified
SettingValue
  Name ID format
  email
Force Name ID FormatOFF
Force POST BindingON
Include AuthnStatementON

Signature & Encryption — defaults if not specified
SettingValue
Sign DocumentsOFF
Sign AssertionsON
  1. Now that you have checked the different parameters, change to the tab called Keys.
    1. Make sure that both parameters are switched to OFF.
  2. Now go to the Advanced tab.
    1. The field Assertion Consumer Service POST Binding URL must equal the Valid Redirect URIs (ACS) = https://miro.com/sso/saml
    • Related Articles

    • Mulesoft - SSO Integration

      This application has been formally tested by Kelvin Zero Inc. This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Mulesoft using Multi-Pass. SSO simplifies user authentication by allowing access to multiple ...
    • D2L Brightspace - SSO Integration

      This application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a step-by-step guide to ...
    • Pipedrive – SSO configuration

      This application has been formally tested by Kelvin Zero Inc. This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Pipedrive using Multi-Pass. SSO simplifies user authentication by allowing access to multiple ...
    • Checkpoint - SSO Configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Checkpoint using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • BambooHR - SSO Configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Bamboo HR using MPAS. SSO simplifies user authentication by allowing access to multiple ...