Skip to content

Commit a15f057

Browse files
authored
Merge pull request #234648 from v-hgampala/aws-ui-changes
Product Backlog Item 2532527: SaaS App Tutorial: AWS Single-Account A…
2 parents e8da7d6 + 03d6a94 commit a15f057

17 files changed

+61
-91
lines changed

articles/active-directory/saas-apps/amazon-web-service-tutorial.md

Lines changed: 61 additions & 91 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 04/17/2023
1313
ms.author: jeedes
1414
---
1515

@@ -41,7 +41,7 @@ Use the information below to make a decision between using the AWS Single Sign-O
4141
| SAML certificate| Single certificate| Separate certificates per app / account |
4242

4343
## AWS Single-Account Access architecture
44-
![Diagram of Azure AD and AWS relationship](./media/amazon-web-service-tutorial/tutorial_amazonwebservices_image.png)
44+
![Screenshot showing Azure AD and AWS relationship.](./media/amazon-web-service-tutorial/tutorial_amazonwebservices_image.png)
4545

4646
You can configure multiple identifiers for multiple instances. For example:
4747

@@ -120,7 +120,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
120120
1. On the **Select a single sign-on method** page, select **SAML**.
121121
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
122122

123-
![Edit Basic SAML Configuration](common/edit-urls.png)
123+
![Screenshot showing Edit Basic SAML Configuration.](common/edit-urls.png)
124124

125125
1. In the **Basic SAML Configuration** section, update both **Identifier (Entity ID)** and **Reply URL** with the same default value: `https://signin.aws.amazon.com/saml`. You must select **Save** to save the configuration changes.
126126

@@ -130,7 +130,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
130130

131131
1. AWS application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
132132

133-
![image](common/default-attributes.png)
133+
![Screenshot showing default attributes.](common/default-attributes.png)
134134

135135
1. In addition to above, AWS application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
136136

@@ -145,19 +145,19 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
145145

146146
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** (Step 3) dialog box, select **Add a certificate**.
147147

148-
![Create new SAML Certificate](common/add-saml-certificate.png)
148+
![Screenshot showing Create new SAML Certificate.](common/add-saml-certificate.png)
149149

150150
1. Generate a new SAML signing certificate, and then select **New Certificate**. Enter an email address for certificate notifications.
151151

152-
![New SAML Certificate](common/new-saml-certificate.png)
152+
![Screenshot showing New SAML Certificate.](common/new-saml-certificate.png)
153153

154154
1. In the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
155155

156-
![The Certificate download link](./media/amazon-web-service-tutorial/certificate.png)
156+
![Screenshot showing the Certificate download link.](./media/amazon-web-service-tutorial/certificate.png)
157157

158158
1. In the **Set up AWS Single-Account Access** section, copy the appropriate URL(s) based on your requirement.
159159

160-
![Copy configuration URLs](common/copy-configuration-urls.png)
160+
![Screenshot showing Copy configuration URLs.](common/copy-configuration-urls.png)
161161

162162
### Create an Azure AD test user
163163

@@ -188,83 +188,68 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
188188

189189
1. In a different browser window, sign-on to your AWS company site as an administrator.
190190

191-
2. Select **AWS Home**.
191+
1. In AWS home page, search for **IAM** and click it.
192192

193-
![Screenshot of AWS company site, with AWS Home icon highlighted][11]
193+
![Screenshot of AWS services page, with IAM highlighted.](./media/amazon-web-service-tutorial/identity-access-management.png)
194194

195-
3. Select **Identity and Access Management**.
195+
1. Go to **Access management** -> **Identity Providers** and click **Add provider** button.
196196

197-
![Screenshot of AWS services page, with IAM highlighted][12]
197+
![Screenshot of IAM page, with Identity Providers and Create Provider highlighted.](./media/amazon-web-service-tutorial/add-provider.png)
198198

199-
4. Select **Identity Providers** > **Create Provider**.
199+
1. In the **Add an Identity provider** page, perform the following steps:
200200

201-
![Screenshot of IAM page, with Identity Providers and Create Provider highlighted][13]
201+
![Screenshot of Configure Provider.](./media/amazon-web-service-tutorial/adding-provider.png)
202202

203-
5. On the **Configure Provider** page, perform the following steps:
203+
a. For **Provider type**, select **SAML**.
204204

205-
![Screenshot of Configure Provider][14]
205+
b. For **Provider name**, type a provider name (for example: *WAAD*).
206206

207-
a. For **Provider Type**, select **SAML**.
207+
c. To upload your downloaded **metadata file** from the Azure portal, select **Choose file**.
208208

209-
b. For **Provider Name**, type a provider name (for example: *WAAD*).
209+
d. Click **Add provider**.
210210

211-
c. To upload your downloaded **metadata file** from the Azure portal, select **Choose File**.
211+
1. Select **Roles** > **Create role**.
212212

213-
d. Select **Next Step**.
213+
![Screenshot of Roles page.](./media/amazon-web-service-tutorial/create-role.png)
214214

215-
6. On the **Verify Provider Information** page, select **Create**.
215+
1. On the **Create role** page, perform the following steps:
216216

217-
![Screenshot of Verify Provider Information, with Create highlighted][15]
217+
![Screenshot of Create role page.](./media/amazon-web-service-tutorial/creating-role.png)
218218

219-
7. Select **Roles** > **Create role**.
220219

221-
![Screenshot of Roles page][16]
220+
a. Choose **Trusted entity type**, select **SAML 2.0 federation**.
222221

223-
8. On the **Create role** page, perform the following steps:
224-
225-
![Screenshot of Create role page][19]
226-
227-
a. Under **Select type of trusted entity**, select **SAML 2.0 federation**.
228-
229-
b. Under **Choose a SAML 2.0 Provider**, select the **SAML provider** you created previously (for example: *WAAD*).
222+
b. Under **SAML 2.0 based provider**, select the **SAML provider** you created previously (for example: *WAAD*).
230223

231224
c. Select **Allow programmatic and AWS Management Console access**.
232225

233-
d. Select **Next: Permissions**.
226+
d. Select **Next**.
234227

235-
9. On the **Attach permissions policies** dialog box, attach the appropriate policy, per your organization. Then select **Next: Review**.
228+
1. On the **Permissions policies** dialog box, attach the appropriate policy, per your organization. Then select **Next**.
236229

237-
![Screenshot of Attach permissions policy dialog box][33]
230+
![Screenshot of Attach permissions policy dialog box.](./media/amazon-web-service-tutorial/permissions-to-role.png)
238231

239-
10. On the **Review** dialog box, perform the following steps:
232+
1. On the **Review** dialog box, perform the following steps:
240233

241-
![Screenshot of Review dialog box][34]
234+
![Screenshot of Review dialog box.](./media/amazon-web-service-tutorial/review-role.png)
242235

243236
a. In **Role name**, enter your role name.
244237

245-
b. In **Role description**, enter the description.
238+
b. In **Description**, enter the role description.
246239

247240
c. Select **Create role**.
248241

249-
d. Create as many roles as needed, and map them to the identity provider.
250-
251-
11. Use AWS service account credentials for fetching the roles from the AWS account in Azure AD user provisioning. For this, open the AWS console home.
242+
d. Create as many roles as needed and map them to the identity provider.
252243

253-
12. Select **Services**. Under **Security, Identity & Compliance**, select **IAM**.
244+
1. Use AWS service account credentials for fetching the roles from the AWS account in Azure AD user provisioning. For this, open the AWS console home.
254245

255-
![Screenshot of AWS console home, with Services and IAM highlighted](./media/amazon-web-service-tutorial/fetchingrole1.png)
246+
1. In the IAM section, select **Policies** and click **Create policy**.
256247

257-
13. In the IAM section, select **Policies**.
248+
![Screenshot of IAM section, with Policies highlighted.](./media/amazon-web-service-tutorial/create-policy.png)
258249

259-
![Screenshot of IAM section, with Policies highlighted](./media/amazon-web-service-tutorial/fetchingrole2.png)
250+
1. Create your own policy to fetch all the roles from AWS accounts.
260251

261-
14. Create a new policy by selecting **Create policy** for fetching the roles from the AWS account in Azure AD user provisioning.
262-
263-
![Screenshot of Create role page, with Create policy highlighted](./media/amazon-web-service-tutorial/fetchingrole3.png)
264-
265-
15. Create your own policy to fetch all the roles from AWS accounts.
266-
267-
![Screenshot of Create policy page, with JSON highlighted](./media/amazon-web-service-tutorial/policy1.png)
252+
![Screenshot of Create policy page, with JSON highlighted.](./media/amazon-web-service-tutorial/creating-policy.png)
268253

269254
a. In **Create policy**, select the **JSON** tab.
270255

@@ -285,67 +270,52 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
285270
}
286271
```
287272

288-
c. Select **Review policy** to validate the policy.
273+
c. Click **Next: Tags**.
274+
275+
1. You can also add the required tags in the below page and click **Next: Review**.
289276

290-
![Screenshot of Create policy page](./media/amazon-web-service-tutorial/policy5.png)
277+
![Screenshot of Create policy tag page.](./media/amazon-web-service-tutorial/tag-policy.png)
291278

292-
16. Define the new policy.
279+
1. Define the new policy.
293280

294-
![Screenshot of Create policy page, with Name and Description fields highlighted](./media/amazon-web-service-tutorial/policy2.png)
281+
![Screenshot of Create policy page, with Name and Description fields highlighted.](./media/amazon-web-service-tutorial/review-policy.png)
295282

296283
a. For **Name**, enter **AzureAD_SSOUserRole_Policy**.
297284

298285
b. For **Description**, enter **This policy will allow to fetch the roles from AWS accounts**.
299286

300287
c. Select **Create policy**.
301288

302-
17. Create a new user account in the AWS IAM service.
303-
304-
a. In the AWS IAM console, select **Users**.
305-
306-
![Screenshot of AWS IAM console, with Users highlighted](./media/amazon-web-service-tutorial/policy3.png)
307-
308-
b. To create a new user, select **Add user**.
309-
310-
![Screenshot of Add user button](./media/amazon-web-service-tutorial/policy4.png)
311-
312-
c. In the **Add user** section:
313-
314-
![Screenshot of Add user page, with User name and Access type highlighted](./media/amazon-web-service-tutorial/adduser1.png)
315-
316-
* Enter the user name as **AzureADRoleManager**.
317-
318-
* For the access type, select **Programmatic access**. This way, the user can invoke the APIs and fetch the roles from the AWS account.
289+
1. Create a new user account in the AWS IAM service.
319290

320-
* Select **Next Permissions**.
291+
a. In the AWS IAM console, select **Users** and click **Add users**.
321292

322-
18. Create a new policy for this user.
293+
![Screenshot of AWS IAM console, with Users highlighted.](./media/amazon-web-service-tutorial/create-user.png)
323294

324-
![Screenshot shows the Add user page where you can create a policy for the user.](./media/amazon-web-service-tutorial/adduser2.png)
295+
b. In the **Specify user details** section, enter the user name as **AzureADRoleManager** and select **Next**.
325296

326-
a. Select **Attach existing policies directly**.
297+
![Screenshot of Add user page, with User name and Access type highlighted.](./media/amazon-web-service-tutorial/user-details.png)
327298

328-
b. Search for the newly created policy in the filter section **AzureAD_SSOUserRole_Policy**.
299+
c. Create a new policy for this user.
329300

330-
c. Select the policy, and then select **Next: Review**.
301+
![Screenshot shows the Add user page where you can create a policy for the user.](./media/amazon-web-service-tutorial/permissions-to-user.png)
331302

332-
19. Review the policy to the attached user.
303+
d. Select **Attach existing policies directly**.
333304

334-
![Screenshot of Add user page, with Create user highlighted](./media/amazon-web-service-tutorial/adduser3.png)
305+
e. Search for the newly created policy in the filter section **AzureAD_SSOUserRole_Policy**.
335306

336-
a. Review the user name, access type, and policy mapped to the user.
307+
f. Select the policy, and then select **Next**.
337308

338-
b. Select **Create user**.
309+
1. Review your choices and select **Create user**.
339310

340-
20. Download the user credentials of a user.
311+
1. To download the user credentials of a user, enable the console access in **Security credentials** tab.
341312

342-
![Screenshot shows the Add user page with a Download c s v button to get user credentials.](./media/amazon-web-service-tutorial/adduser4.png)
313+
![Screenshot shows the Security credentials.](./media/amazon-web-service-tutorial/enable-console-access.png)
343314

344-
a. Copy the user **Access key ID** and **Secret access key**.
315+
1. Enter these credentials into the Azure AD user provisioning section to fetch the roles from the AWS console.
345316

346-
b. Enter these credentials into the Azure AD user provisioning section to fetch the roles from the AWS console.
317+
![Screenshot shows the download the user credentials.](./media/amazon-web-service-tutorial/download-password.png)
347318

348-
c. Select **Close**.
349319

350320
> [!NOTE]
351321
> AWS has a set of permissions/limts are required to configure AWS SSO. To know more information on AWS limits, please refer [this](https://docs.aws.amazon.com/singlesignon/latest/userguide/limits.html) page.
@@ -354,11 +324,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
354324

355325
1. In the Azure AD management portal, in the AWS app, go to **Provisioning**.
356326

357-
![Screenshot of AWS app, with Provisioning highlighted](./media/amazon-web-service-tutorial/provisioning.png)
327+
![Screenshot of AWS app, with Provisioning highlighted.](./media/amazon-web-service-tutorial/provisioning.png)
358328

359329
2. Enter the access key and secret in the **clientsecret** and **Secret Token** fields, respectively.
360330

361-
![Screenshot of Admin Credentials dialog box](./media/amazon-web-service-tutorial/provisioning1.png)
331+
![Screenshot of Admin Credentials dialog box.](./media/amazon-web-service-tutorial/provisioning1.png)
362332

363333
a. Enter the AWS user access key in the **clientsecret** field.
364334

@@ -370,7 +340,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
370340

371341
3. In the **Settings** section, for **Provisioning Status**, select **On**. Then select **Save**.
372342

373-
![Screenshot of Settings section, with On highlighted](./media/amazon-web-service-tutorial/provisioning2.png)
343+
![Screenshot of Settings section, with On highlighted.](./media/amazon-web-service-tutorial/provisioning2.png)
374344

375345
> [!NOTE]
376346
> The provisioning service imports roles only from AWS to Azure AD. The service does not provision users and groups from Azure AD to AWS.
@@ -400,7 +370,7 @@ You can also use Microsoft My Apps to test the application in any mode. When you
400370

401371
## Known issues
402372

403-
* AWS Single-Account Access provisioning integration cannot be used in the the AWS China regions.
373+
* AWS Single-Account Access provisioning integration cannot be used in the AWS China regions.
404374

405375
* In the **Provisioning** section, the **Mappings** subsection shows a "Loading..." message, and never displays the attribute mappings. The only provisioning workflow supported today is the import of roles from AWS into Azure AD for selection during a user or group assignment. The attribute mappings for this are predetermined, and aren't configurable.
406376

115 KB
Loading
68.6 KB
Loading
101 KB
Loading
58 KB
Loading
94.1 KB
Loading
38.3 KB
Loading
96.9 KB
Loading
48.6 KB
Loading
55.6 KB
Loading

0 commit comments

Comments
 (0)