You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -103,7 +103,7 @@ This section guides you through the steps to configure the Azure AD provisioning
103
103
104
104
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to AWS IAM Identity Center**.
105
105
106
-
9. Review the user attributes that are synchronized from Azure AD to AWS IAM Identity Center in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in AWS IAM Identity Center for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the AWS IAM Identity Center API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
106
+
9. Review the user attributes that are synchronized from Azure AD to AWS IAM Identity Center in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in AWS IAM Identity Center for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you'll need to ensure that the AWS IAM Identity Center API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
107
107
108
108
|Attribute|Type|Supported for Filtering|
109
109
|---|---|---|
@@ -164,12 +164,35 @@ Once you've configured provisioning, use the following resources to monitor your
164
164
165
165
1. Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
166
166
2. Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
167
-
3. If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
167
+
3. If the provisioning configuration seems to be in an unhealthy state, the application goes into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
168
+
169
+
## Just-in-time (JIT) application access with PIM for groups (preview)
170
+
With PIM for Groups, you can provide just-in-time access to groups in Amazon Web Services and reduce the number of users that have permanent access to privileged groups in AWS.
171
+
172
+
**Configure your enterprise application for SSO and provisioning**
173
+
1. Add AWS IAM Identity Center to your tenant, configure it for provisioning as described in the tutorial above, and start provisioning.
174
+
1. Configure [single sign-on](aws-single-sign-on-provisioning-tutorial.md) for AWS IAM Identity Center.
175
+
1. Create a [group](https://learn.microsoft.com/azure/active-directory/fundamentals/how-to-manage-groups) that will provide all users access to the application.
176
+
1. Assign the group to the AWS Identity Center application.
177
+
1. Assign your test user as a direct member of the group created in the previous step, or provide them access to the group through an access package. This group can be used for persistent, non-admin access in AWS.
178
+
179
+
**Enable PIM for groups**
180
+
1. Create a second group in Azure AD. This group will provide access to admin permissions in AWS.
181
+
1. Bring the group under [management in Azure AD PIM](https://learn.microsoft.com/azure/active-directory/privileged-identity-management/groups-discover-groups).
182
+
1. Assign your test user as [eligible for the group in PIM](https://learn.microsoft.com/azure/active-directory/privileged-identity-management/groups-assign-member-owner) with the role set to member.
183
+
1. Assign the second group to the AWS IAM Identity Center application.
184
+
1. Use on-demand provisioning to create the group in AWS IAM Identity Center.
185
+
1. Sign-in to AWS IAM Identity Center and assign the second group the necessary permissions to perform admin tasks.
186
+
187
+
Now any end user that was made eligible for the group in PIM can get JIT access to the group in AWS by [activating their group membership](https://learn.microsoft.com/azure/active-directory/privileged-identity-management/groups-activate-roles#activate-a-role).
188
+
189
+
> [!IMPORTANT]
190
+
> The group membership is provisioned roughly a minute after the activation is complete. Please wait before attempting to sign-in to AWS. If the user is unable to access the necessary group in AWS, please review the troubleshooting tips below and provisioning logs to ensure that the user was successfully provisioned.
168
191
169
192
## Troubleshooting Tips
170
193
171
194
### Missing attributes
172
-
When exporting a user to AWS, they are required to have the following attributes
195
+
When provisioning a user to AWS, they're required to have the following attributes
173
196
174
197
* firstName
175
198
* lastName
@@ -182,7 +205,7 @@ Users who don't have these attributes will fail with the following error
182
205
183
206
184
207
### Multi-valued attributes
185
-
AWS does not support the following multi-valued attributes:
208
+
AWS doesn't support the following multi-valued attributes:
0 commit comments