Default Relay State - must be left empty in your configurationĪn unsigned SAML Response with a signed AssertionĪ signed SAML Response with a signed Assertion.Identifier (Entity ID, Relying Party Trust Identifier) :.Assertion Consumer Service URL (Allowed Callback URL) :.The service URL (SP-initiated URL) (aka Launch URL, Reply URL, Relying Party SSO Service URL, Target URL, SSO Login URL, Identity Provider Endpoint, etc) :.We recommend skipping optional fields or set everything to default values). Then be sure to add the following data (however, depending on the identity provider you may have more or fewer fields to be filled out.
Here you can also find an article on how to set up Jumpcloud SSO (and SCIM).įirst, go to your identity provider's configuration panel and follow the provider's instructions to configure Single Sign-On. The how-tos for the most popular identity platform solutions can be seen below:
Your account's end-users (members, guests) with the corporate domains must log into Miro via the SSO option using their identity provider credentials. The SSO process is applied to the corporate domains that you add to the SSO settings.Once SSO is enabled for the account, the following rules apply to the end-users: Miro also supports SCIM with any Identity Provider of your choice (both SP- and IDP-initiated logins).Īvailable for: Enterprise, Business plans Miro's SAML-based single sign-on (or SSO) feature will provide your end-users with access to the Miro application through an identity provider (IdP) of your choice.