Set up by: Company Admins
💡 It is strongly recommended to configure SSO in a separate incognito mode window of your browser. This way, you keep the session in the standard window, allowing you to switch off the SSO authorization in case something is misconfigured.
If you wish to set up a test instance before enabling SSO on production, please request it with your Account Executive or Sales representative. Only those who configure SSO will be added to this test instance.
⚠️ See our main SSO article here for rules, supported features and optional configuration on the Miro end.
You’ll need the following to set up AWS SSO access to with Miro:
- Access to the AWS SSO console with IAM permissions to manage applications
- Company-level admin permissions on Miro's Enterprise or Business plan
On the AWS SSO Configure page, add a new application and search for Miro. When adding the Miro application the display name and description can be updated.
AWS SSO Application Catalog
- Log into the Miro dashboard in a different browser window. We recommend a separate incognito browser window.
- On the top right, click your profile icon, then go to Settings. On the left panel ensure that the correct team is selected from the drop-down menu in the top left.
- On the left panel, go to Enterprise integrations (Business plan users need to go to Security) and toggle the Enable SSO/SAML option. Enter the following value for SAML Sign-in URL from AWS SSO.
AWS SSO Application Configuration Page
- Download the AWS SSO SAML metadata file and copy and paste the X509 Certificate to Key x509 Certificate. Your configuration in Miro should now look similar to the configuration below.
Miro SSO Configuration Settings
- In Miro SSO configuration, enter your company email domain name into the value for Domains. Make sure that you have added at least one Company Domain.
- Click Save to save changes.
- Return to your application for Miro in the AWS SSO web console. Under Application metadata, check to make sure the following values are entered. These should automatically pull in if you searched for and added the Miro application instead of creating a custom application.
Field Value Application ACS URL Application SAML audience https://miro.com/
- Choose Save Changes.
- Assign a user to the application in the Application's Assigned users of the AWS SSO console.
And that's all! Your SSO configuration is now complete.
If you'd like to also enable auto-provisioning for Miro, check out this article.
Use the following section to verify the SSO integration. Before verification, ensure that the user performing the verification is logged out of both AWS SSO and Miro before performing the steps below. Users will not be able to login using SSO unless the user exists in your directory, is a member of your Enterprise or Business plan in Miro, and the user is assigned to the application.
Verifying IdP Initiated SSO from AWS SSO
- Access the AWS SSO end-user portal using the credentials of a user assigned to the Miro application.
- In the list of applications, choose Miro application to initiate a login to Miro.
- If login was successful you will be signed-in to the Miro dashboard.
Verifying Service Provider Initiated SSO from Miro
- Access https://miro.com/login/ and choose Sign in with SSO. Then enter your work email.
- You will be redirected to the AWS SSO portal where you will type in the credentials of a user assigned to the application in the AWS SSO console.
- You will be signed-in to the Miro dashboard if login was successful.
For general troubleshooting problems, please refer to the AWS SSO Troubleshooting Guide.