Skip to content

Commit 783f0b8

Browse files
Merge pull request #241845 from ArvindHarinder1/patch-297
Update aws-single-sign-on-provisioning-tutorial.md
2 parents 7a0480a + ee7085a commit 783f0b8

File tree

1 file changed

+28
-5
lines changed

1 file changed

+28
-5
lines changed

articles/active-directory/saas-apps/aws-single-sign-on-provisioning-tutorial.md

Lines changed: 28 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 11/21/2022
16+
ms.date: 06/20/2023
1717
ms.author: thwimmer
1818
---
1919

@@ -103,7 +103,7 @@ This section guides you through the steps to configure the Azure AD provisioning
103103

104104
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to AWS IAM Identity Center**.
105105

106-
9. Review the user attributes that are synchronized from Azure AD to AWS IAM Identity Center in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in AWS IAM Identity Center for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the AWS IAM Identity Center API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
106+
9. Review the user attributes that are synchronized from Azure AD to AWS IAM Identity Center in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in AWS IAM Identity Center for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you'll need to ensure that the AWS IAM Identity Center API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
107107

108108
|Attribute|Type|Supported for Filtering|
109109
|---|---|---|
@@ -164,12 +164,35 @@ Once you've configured provisioning, use the following resources to monitor your
164164

165165
1. Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
166166
2. Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
167-
3. If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
167+
3. If the provisioning configuration seems to be in an unhealthy state, the application goes into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
168+
169+
## Just-in-time (JIT) application access with PIM for groups (preview)
170+
With PIM for Groups, you can provide just-in-time access to groups in Amazon Web Services and reduce the number of users that have permanent access to privileged groups in AWS.
171+
172+
**Configure your enterprise application for SSO and provisioning**
173+
1. Add AWS IAM Identity Center to your tenant, configure it for provisioning as described in the tutorial above, and start provisioning.
174+
1. Configure [single sign-on](aws-single-sign-on-provisioning-tutorial.md) for AWS IAM Identity Center.
175+
1. Create a [group](https://learn.microsoft.com/azure/active-directory/fundamentals/how-to-manage-groups) that will provide all users access to the application.
176+
1. Assign the group to the AWS Identity Center application.
177+
1. Assign your test user as a direct member of the group created in the previous step, or provide them access to the group through an access package. This group can be used for persistent, non-admin access in AWS.
178+
179+
**Enable PIM for groups**
180+
1. Create a second group in Azure AD. This group will provide access to admin permissions in AWS.
181+
1. Bring the group under [management in Azure AD PIM](https://learn.microsoft.com/azure/active-directory/privileged-identity-management/groups-discover-groups).
182+
1. Assign your test user as [eligible for the group in PIM](https://learn.microsoft.com/azure/active-directory/privileged-identity-management/groups-assign-member-owner) with the role set to member.
183+
1. Assign the second group to the AWS IAM Identity Center application.
184+
1. Use on-demand provisioning to create the group in AWS IAM Identity Center.
185+
1. Sign-in to AWS IAM Identity Center and assign the second group the necessary permissions to perform admin tasks.
186+
187+
Now any end user that was made eligible for the group in PIM can get JIT access to the group in AWS by [activating their group membership](https://learn.microsoft.com/azure/active-directory/privileged-identity-management/groups-activate-roles#activate-a-role).
188+
189+
> [!IMPORTANT]
190+
> The group membership is provisioned roughly a minute after the activation is complete. Please wait before attempting to sign-in to AWS. If the user is unable to access the necessary group in AWS, please review the troubleshooting tips below and provisioning logs to ensure that the user was successfully provisioned.
168191
169192
## Troubleshooting Tips
170193

171194
### Missing attributes
172-
When exporting a user to AWS, they are required to have the following attributes
195+
When provisioning a user to AWS, they're required to have the following attributes
173196

174197
* firstName
175198
* lastName
@@ -182,7 +205,7 @@ Users who don't have these attributes will fail with the following error
182205

183206

184207
### Multi-valued attributes
185-
AWS does not support the following multi-valued attributes:
208+
AWS doesn't support the following multi-valued attributes:
186209

187210
* email
188211
* phone numbers

0 commit comments

Comments
 (0)