Vimeo - SSO configuration

Vimeo - SSO configuration

Alert
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk.
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Vimeo using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization
Warning
To set up Multi-Pass with  Vimeo, ensure you meet the following requirements:
- Vimeo admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Vimeo are registered in your IdP and have the necessary permissions to access Vimeo.
- This new SSO experience is currently available only to new customers on Vimeo. If you set up SSO before April 2024, you will receive this experience later this year with a migration guide. To switch early, contact your Vimeo Account Manager.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.



Vimeo - SSO configuration




Step 1 - Create the Vimeo SAML Connection & Configure Multi-Pass as IdP

  1. In Vimeo, go to Team Management,
  2. Click on Settings and reach Single Sign-On.
  3. Click +Create Connection and name it (e.g., Multi-Pass).
  4. Copy the Entity ID and ACS URL shown under Vimeo Metadata (you will paste them into Multi-Pass).
NotesVimeo also shows a Single Logout URL (optional). SLO ends Vimeo sessions as soon as users log out of your IdP (see “How to control session duration”).
  1. Open Multi-Pass Dashboard

  1. Select your tenant
  2. Go to Integrations, on the left side of your screen, click on Applications
  3. Add Application (SAML).
  1. Complete the form with the information below :
FieldValue
Client ID (=SP Entity ID)Paste Vimeo’s Entity ID
NameVimeo
DescriptionSSO integration
Assertion Consumer Service URLPaste Vimeo’s ACS URL
NameID Policy Formatemail
  1. download the Multi-Pass IdP metadata (XML)
  2. Click on "Add integration"
  3. Go to the advanced console by clicking on the right side of your screen
  1. Click on Client and use the search bar to fin Vimeo
  2. Make sure all the fields are well completed : 
General settings (Multi-Pass)
FieldValue
Client IDCopy from Vimeo Metadata (Entity ID)
  Name
  Vimeo
DescriptionSSO integration
  Always display in UI
 ON

Access settings (Multi-Pass)
FieldValue
Home URL (IdP-initiated)https://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml/clients/<APP_NAME>
Valid Redirect URIs (ACS)Paste Vimeo’s ACS URL
IDP-Initiated SSO URL Name<APP_NAME>
Valid post logout redirect URIsPaste Vimeo’s Single Logout URL if used (Optional)

SAML Capabilities
SettingValue
Name ID Formatemail
Force Name ID FormatON
Force POST BindingON
Include AuthnStatementON

Signature & Encryption
SettingValue
Sign DocumentsOFF
Sign AssertionsON
  1. Click on the "Keys" tab and make sure both parameters are switched to OFF
  2. Then move to the advanced tab
    1. Assertion Consumer Service POST Binding URL = Valid Redirect URIs (ACS) = Paste Vimeo’s ACS URL
  3. Finally move the tab "client scope"
  4. Select the line corresponding to your client 
  1. Click on "configure a new mapper" 
  2. Select "user attribute", we will create two different user attribute for firstName and lastName.

  1. Complete the form : 
firstName
FieldValue
Mapper TypeUser Attribute
Nameuser.firstName
User AttributefirstName
Friendly Nameuser.firstName
SAML Attribute Nameuser.firstName

lastName
FieldValue
Mapper TypeUser Attribute
Nameuser.lastName
User AttributelastName
Friendly Nameuser.lastName
SAML Attribute Nameuser.lastName

Step 2 - Finalise VIMEO's configuration, test, Claim Domain & Finalize SSO

  1. Go back to Vimeo SAML modal
  2. upload the Multi-Pass IdP metadata XML (Vimeo will parse the Sign-in URL and certificate).
    1. Alternatively: paste your IdP Sign-in URL and upload the IdP signing certificate (.pem, .crt, or .cert).
      1. IdP Entity ID = https://ca.auth.kzero.com/realms/<TENANT_NAME>
      2. Sign-In URL = https://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml
      3. Sign-Out URL (optional) =  https://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml
  3. Save the SAML connection in Vimeo
Info
SSO is not forced yet (you can test first and enforce later).
  1. In the Vimeo SAML connection modal (Step 2), copy the test link and open it in a new tab (private/incognito) to try logging in.
Notes
Test users must already be on your Vimeo team. To provision new users during the test, enable JIT provisioning in settings.
  1. Once validated, you can request to claim your domain for this SAML connection. After Vimeo approval, users with your company domain will be forced to sign in via SSO.

Provisioning options (Vimeo)

OptionDescription
Just-In-Time (JIT)Automatically creates users upon first SSO login (recommended if you want auto-provisioning; domain claim may be required).
Team-based SSOOnly users already on your Vimeo team can authenticate via SSO (no auto-provisioning).
SCIMFull lifecycle sync of users/groups via SCIM (create, update, deactivate). Requires Vimeo Enterprise and SCIM app setup.

SSO settings (Vimeo)

SettingDescription
Force SSOPrevents email/password logins and disables password resets. Enabled automatically after domain claim or when team-only SSO is on.
Default roleAssigns a default role to users created via JIT or SCIM.
Logout redirect URLURL where users are redirected after logging out of Vimeo.








    • Related Articles

    • SAML SSO Integration Guide

      This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
    • Notion - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
    • Vanta - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Vanta using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Dynatrace - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Dynatrace using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Addigy - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Addigy using MPAS. SSO simplifies user authentication by allowing access to multiple ...