ºÚÁϺ£½Ç91Èë¿Ú enables employees of your organization to sign into Amazon's Web Service with role-based access using multiple SSO Connectors.
Read this article to learn how to configure the Amazon IAM (Multiple Roles) connector.Â
Prerequisites
- A ºÚÁϺ£½Ç91Èë¿Ú administrator account
- ºÚÁϺ£½Ç91Èë¿Ú SSO Package or higher or SSO add-on feature.
- AWS Admin account (AWS root user)
- AWS organization
Important Considerations
- Amazon IAM only supports IdP-Initiated SSO.
- Each connector you create for Amazon IAM can allow for a specific and unique role to be set. Using Tags will enable you to assign specific users to each specific connector.
Creating a new ºÚÁϺ£½Ç91Èë¿Ú Application Integration
- Log in to the .
- Go to USER AUTHENTICATION &²µ³Ù;ÌýSSO Applications.
- Click + Add New Application.
- Type the name of the application in the Search field and select it.
- Click Next.
- In the Display Label, type your name for the application. Optionally, you can enter a Description, adjust the User Portal Image and choose to hide or Show in User Portal.
If this is a Bookmark Application, enter your sign-in URL in the Bookmark URL field.
- Optionally, expand Advanced Settings to specify a value for the SSO IdP URL. If no value is entered, it will default to https://sso.jumpcloud.com/saml2/<applicationname>.
The SSO IdP URL is not editable after the application is created. You will have to delete and recreate the connector if you need to edit this field at a later time.
- Click Save Application.
- If successful, click:
- Configure Application and go to the next section
- Close to configure your new application at a later time
Configuring the SSO Integration
To configure ºÚÁϺ£½Ç91Èë¿Ú
- Create a new application or select it from the Configured Applications list.
- Select the SSO tab.
- In the CONSTANT ATTRIBUTES section, leave the default settings for the values under Name <https://aws.amazon.com/SAML/Attributes/RoleSessionName>; and <https://aws.amazon.com/SAML/Attributes/Role>; respectively.
- In the first value field, leave the default value of SSO-User.
- In the second value field, change the default value of arn:aws:iam::YOUR_AWS_ACCOUNT_NUMBER:role/SAML-User,arn:aws:iam::YOUR_AWS_ACCOUNT_NUMBER:saml-provider/ºÚÁϺ£½Ç91Èë¿Ú
(ReplaceYOUR_AWS_ACCOUNT_NUMBER with the account number associated with your AWS Account). - In the field terminating the IdP URL, change the default value to aws-a
- Click save.
Click on the Applications link in the side navigation
- Click on the Amazon Web Services Icon
- For values under Name, leave the default setting (https://aws.amazon.com/SAML/Attributes/RoleSessionName) and https://aws.amazon.com/SAML/Attributes/Role respectively.
- Click Upload IdP Private Key and upload your private key (see note above)
- Click Upload IdP Certificate and upload your public certificate (see note above)
- In the first Value field, leave the default value of SSO-User
- In the second Value field, change the default value of arn:aws:iam::YOUR_AWS_ACCOUNT_NUMBER:role/SAML-User,arn:aws:iam::YOUR_AWS_ACCOUNT_NUMBER:saml-provider/ºÚÁϺ£½Ç91Èë¿Ú (ReplaceYOUR_AWS_ACCOUNT_NUMBER with the account number associated with your AWS Account)
- In the IdP URL field, change the default value to aws-a
- Enter in a Display Label for this Connector
- Click Activate
- Click the export metadata button for the Amazon IAM entry (this will download a metadata file named ºÚÁϺ£½Ç91Èë¿Ú-aws-metadata.xml)
- Repeat Steps 1-7 for the Second AWS SSO Connector
- In the second Value field, change the default value of arn:aws:iam::YOUR_AWS_ACCOUNT_NUMBER:role/SAML-User,arn:aws:iam::YOUR_AWS_ACCOUNT_NUMBER:saml-provider/ºÚÁϺ£½Ç91Èë¿Ú (Replace YOUR_AWS_ACCOUNT_NUMBER with the account number associated with your AWS Account and ensure that this field has arn:aws:iam::YOUR_AWS_ACCOUNT_NUMBER:role/SAML2-User,arn:aws:iam::YOUR_AWS_ACCOUNT_NUMBER:saml-provider/ºÚÁϺ£½Ç91Èë¿Ú2 )
- In the IdP URL field, change the value to aws-b
- Enter in a Display Label for this Connector
- Click Activate
- Click export metadata button for the Amazon IAM entry (this will download a metadata file named ºÚÁϺ£½Ç91Èë¿Ú-aws-metadata-2.xml
​​To configure AWS
- Log in to Amazon Web Services console for your organization
- Under the Security & Identity section, click on Identity & Access Management (IAM)
- Click Identity Providers in the Sidebar under Details
- Click Create Provider
- ​Provider Type: SAML
- Provider Name: ºÚÁϺ£½Ç91Èë¿Ú
- Click the Choose File button next to Metadata file and upload the ºÚÁϺ£½Ç91Èë¿Ú-aws-metadata.xml file (downloaded in step 12 above)
- Click Next Step then select Create
- Create a second Identity Provider
- Provider Type: SAML
- Provider Name: ºÚÁϺ£½Ç91Èë¿Ú2
- Click the Choose File button next to Metadata file and upload the ºÚÁϺ£½Ç91Èë¿Ú-aws-metadata-2.xml file (downloaded in step 18 above)
- Click Next Step then select °ä°ù±ð²¹³Ù±ð​
- ​Click Roles in the Sidebar under Details
- Click Create New Role ​​
- Role Name: SAML-User
- Role Type: Role for Identity Provider Access
- ​Grant Web Single Sign-On (WebSSO) access to SAML providers ​
- ​SAML Provider: ºÚÁϺ£½Ç91Èë¿Ú
- Click Next Step then Next Step again on the Verify Role Trust page
- Select the desired Policies from the list of available policies then click Next Step
- Review the information, then select Create Role
- ​Click Create New Role for the second time
- Role Name: SAML2-User
- Role Type: Role for Identity Provider Access
- ​Grant Web Single Sign-On (WebSSO) access to SAML providers
- ​SAML Provider: ºÚÁϺ£½Ç91Èë¿Ú2
- Click Next Step then Next Step again on the Verify Role Trust page
- Select the desired Policies from the list of available policies then click Next Step
- Review the information, then select Create Role
Authorizing User SSO Access
Users are implicitly denied access to applications. After you connect an application to ºÚÁϺ£½Ç91Èë¿Ú, you need to authorize user access to that application. You can authorize user access from the Application Configuration panel or from the Groups Configuration panel.
To authorize user access from the Application Configuration panel
- Log in to the .
- Go to USER AUTHENTICATION > SSO Applications, then select the application to which you want to authorize user access.
- Select the User Groups tab. If you need to create a new group of users, see Get Started: User Groups.
- Select the check box next to the group of users you want to give access.
- Click save.
To learn how to authorize user access from the Groups Configuration panel, see Authorize Users to an SSO Application.
Testing Your Single Sign-on (SSO) Configuration
IdP-Initiated Flow
- In the ºÚÁϺ£½Ç91Èë¿Ú Admin Console, create a tag called SSO-AWS-A and then select the users you wish to grant access to the resources provided in Step 7 of Part 2
- Create a second tag called SSO-AWS-B and then select the users you wish to grant access to the resources provided in Step 8 of Part 2
To deactivate the SSO Integration
- Log in to the .
- Go to USER AUTHENTICATION > SSO Applications.
- Search for the application that you’d like to deactivate and click to open its details panel.
- Select the SSO tab.
- Scroll to the bottom of the configuration.
- Click Deactivate SSO.
- Click save.
- If successful, you will receive a confirmation message.
To delete the application
- Log in to the .
- Go to USER AUTHENTICATION > SSO Applications.
- Search for the application that you’d like to delete.
- Check the box next to the application to select it.
- Click Delete.
- Enter the number of the applications you are deleting
- Click Delete Application.
- If successful, you will see an application deletion confirmation notification.