Skip to content

Miro

Last reviewed: 5 months ago

This guide covers how to configure Miro as a SAML application in Cloudflare Zero Trust.

Prerequisites

  • An identity provider configured in Cloudflare Zero Trust
  • Admin access to a Miro Business or Enterprise plan account
  • A verified domain added to your Miro account (Enterprise plan), or be prepared to do so during SSO configuration (Business or Enterprise plan)

1. Add a SaaS application to Cloudflare Zero Trust

  1. In Zero Trust, go to Access > Applications.
  2. Select Add an application > SaaS.
  3. For Application, enter Miro and select the corresponding textbox that appears.
  4. For the authentication protocol, select SAML.
  5. Select Add application.
  6. Fill in the following fields:
    • Entity ID: https://miro.com/
    • Assertion Consumer Service URL: https://miro.com/sso/saml
    • Name ID format: Email
  7. Copy the SSO endpoint and Public key.
  8. Select Save configuration.
  9. Configure Access policies for the application.
  10. Select Done.

2. Add a SAML SSO provider to Miro

  1. In Miro, select your profile picture > Settings > **Security**.
  2. Turn on SSO/SAML.
  3. Fill in the following fields:
    • SAML Sign-in URL: SSO endpoint from application configuration in Cloudflare Zero Trust
    • Key x509 Certificate: Public key from application configuration in Cloudflare Zero Trust
  4. In Domain, enter the domain you want to configure SSO for and select Enter.
  5. Enter an email address from that domain and select send verification.
  6. Once you receive a verification email, select the link in the email, then select Save. When the domain is successfully configured, the VERIFY EMAIL label next to the domain in the SSO/SAML configuration page will disappear.
  7. If you have additional domains you want to configure SSO for, repeat steps 4-6 for each domain.

3. Test the integration

In the Miro SAML/SSO configuration page, select Test SSO Configuration. You will be redirected to the Cloudflare Access login screen and prompted to sign in with your identity provider. If the login is successful, you will receive a SSO configuration test was successful message.