Important: This article contains out-of-date information. For current application information, see Connecting Applications with JumpCloud Using Pre-Built Connectors.
- Generate a public certificate and private key pair.
- In order to successfully complete the integration between JumpCloud and Miro, you must use an administrator account in Miro.
- How to configure User authorization.
- Access the JumpCloud Administrator Console at https://console.jumpcloud.com.
- Select Applications in the main navigation panel.
- Select the + in the upper left, scroll or search for the application in the 'Configure New Application' side panel, the select 'configure'.
- Optionally, enter Miro for the Display Label. This label will appear under the Service Provider logo within the JumpCloud User Portal.
- You can upload a service provider application's XML metadata file to populate SAML connector attributes for that application. The attributes populated by the metadata file may vary by the application. To apply a metadata file for the application you're connecting, click Upload Metadata. Navigate to the file you want to upload, then click Open. You'll see a confirmation of a successful upload. Be aware that if you upload more than one metadata file, you'll overwrite the attribute values applied in the previously uploaded file.
- In the IDP Entity ID field, enter https://YOURDOMAIN.TLD (e.g., https://thebestwidgets.com).
- Select Upload IdP Private Key and upload the private.pem file generated according to the above prerequisites.
- Select Upload IdP Certificate and upload the cert.pem file generated according to the above prerequisites.
- In the SP Entity ID field, enter https://miro.com/.
- In the ACS URL field, enter https://miro.com/sso/saml.
- In the Default RelayState field, enter https://miro.com/sso/saml.
- In the field terminating the IdP URL, either leave the default value or enter a plaintext string unique to this connector.
- Select Activate.
- Enable SAML SSO in Miro: go to Settings > Security. For SAML, click Enable.
- After you enable SAML, a SAML SSO configuration modal appears. Include the following required information:
- SAML 2.0 Endpoint URL: In most cases it opens your Identity Provider's page, where your end users enter their credentials.
- Public Key x.509 Certificate: Cut and paste the certificate.
- The list of domains allowed to authenticate via your SAML server: Public domains such as @gmail.com and @outlook.com aren't allowed.
- Access the JumpCloud User Console at https://console.jumpcloud.com.
- Select the Service Provider icon.
- This should automatically launch and login to the application.
- Navigate to your Service Provider application URL.
- You will be redirected to log in to the JumpCloud User Portal.
- The browser will be redirected back to the application and be automatically logged in.