You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. In the **Basic SAML Configuration** section, update both **Identifier (Entity ID)** and **Reply URL** with the same default value: `https://signin.aws.amazon.com/saml`. You must select **Save** to save the configuration changes.
126
126
@@ -130,7 +130,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
130
130
131
131
1. AWS application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
1. In addition to above, AWS application expects few more attributes to be passed back in SAML response which are shown below. These attributes are also pre populated but you can review them as per your requirements.
136
136
@@ -145,19 +145,19 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
145
145
146
146
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** (Step 3) dialog box, select **Add a certificate**.
147
147
148
-

148
+

149
149
150
150
1. Generate a new SAML signing certificate, and then select **New Certificate**. Enter an email address for certificate notifications.

153
153
154
154
1. In the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
1. In the **Add an Identity provider**page, perform the following steps:
200
200
201
-
![Screenshot of IAM page, with Identity Providers and Create Provider highlighted][13]
201
+

202
202
203
-
5. On the **Configure Provider** page, perform the following steps:
203
+
a. For **Provider type**, select **SAML**.
204
204
205
-
![Screenshot of Configure Provider][14]
205
+
b. For **Provider name**, type a provider name (for example: *WAAD*).
206
206
207
-
a. For **Provider Type**, select **SAML**.
207
+
c. To upload your downloaded **metadata file** from the Azure portal, select **Choose file**.
208
208
209
-
b. For**Provider Name**, type a provider name (for example: *WAAD*).
209
+
d. Click**Add provider**.
210
210
211
-
c. To upload your downloaded **metadata file**from the Azure portal, select **Choose File**.
211
+
1. Select **Roles**> **Create role**.
212
212
213
-
d. Select **Next Step**.
213
+

214
214
215
-
6. On the **Verify Provider Information** page, select **Create**.
215
+
1. On the **Create role** page, perform the following steps:
216
216
217
-
![Screenshot of Verify Provider Information, with Create highlighted][15]
217
+

218
218
219
-
7. Select **Roles** > **Create role**.
220
219
221
-
![Screenshot of Roles page][16]
220
+
a. Choose **Trusted entity type**, select **SAML 2.0 federation**.
222
221
223
-
8. On the **Create role** page, perform the following steps:
224
-
225
-
![Screenshot of Create role page][19]
226
-
227
-
a. Under **Select type of trusted entity**, select **SAML 2.0 federation**.
228
-
229
-
b. Under **Choose a SAML 2.0 Provider**, select the **SAML provider** you created previously (for example: *WAAD*).
222
+
b. Under **SAML 2.0 based provider**, select the **SAML provider** you created previously (for example: *WAAD*).
230
223
231
224
c. Select **Allow programmatic and AWS Management Console access**.
232
225
233
-
d. Select **Next: Permissions**.
226
+
d. Select **Next**.
234
227
235
-
9. On the **Attach permissions policies** dialog box, attach the appropriate policy, per your organization. Then select **Next: Review**.
228
+
1. On the **Permissions policies** dialog box, attach the appropriate policy, per your organization. Then select **Next**.
236
229
237
-
![Screenshot of Attach permissions policy dialog box][33]
230
+

238
231
239
-
10. On the **Review** dialog box, perform the following steps:
232
+
1. On the **Review** dialog box, perform the following steps:
240
233
241
-
![Screenshot of Review dialog box][34]
234
+

242
235
243
236
a. In **Role name**, enter your role name.
244
237
245
-
b. In **Role description**, enter the description.
238
+
b. In **Description**, enter the role description.
246
239
247
240
c. Select **Create role**.
248
241
249
-
d. Create as many roles as needed, and map them to the identity provider.
250
-
251
-
11. Use AWS service account credentials for fetching the roles from the AWS account in Azure AD user provisioning. For this, open the AWS console home.
242
+
d. Create as many roles as needed and map them to the identity provider.
252
243
253
-
12. Select **Services**. Under **Security, Identity & Compliance**, select **IAM**.
244
+
1. Use AWS service account credentials for fetching the roles from the AWS account in Azure AD user provisioning. For this, open the AWS console home.
254
245
255
-

246
+
1. In the IAM section, select **Policies** and click **Create policy**.
256
247
257
-
13. In the IAM section, select **Policies**.
248
+

258
249
259
-

250
+
1. Create your own policy to fetch all the roles from AWS accounts.
260
251
261
-
14. Create a new policy by selecting **Create policy** for fetching the roles from the AWS account in Azure AD user provisioning.
262
-
263
-

264
-
265
-
15. Create your own policy to fetch all the roles from AWS accounts.
266
-
267
-

252
+

268
253
269
254
a. In **Create policy**, select the **JSON** tab.
270
255
@@ -285,67 +270,52 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
285
270
}
286
271
```
287
272
288
-
c. Select **Review policy** to validate the policy.
273
+
c. Click **Next: Tags**.
274
+
275
+
1. You can also add the required tags in the below page and click **Next: Review**.
289
276
290
-

277
+

291
278
292
-
16. Define the new policy.
279
+
1. Define the new policy.
293
280
294
-

281
+

295
282
296
283
a. For **Name**, enter **AzureAD_SSOUserRole_Policy**.
297
284
298
285
b. For **Description**, enter **This policy will allow to fetch the roles from AWS accounts**.
299
286
300
287
c. Select **Create policy**.
301
288
302
-
17. Create a new user account in the AWS IAM service.
303
-
304
-
a. In the AWS IAM console, select **Users**.
305
-
306
-

307
-
308
-
b. To create a new user, select **Add user**.
309
-
310
-

311
-
312
-
c. In the **Add user** section:
313
-
314
-

315
-
316
-
* Enter the user name as **AzureADRoleManager**.
317
-
318
-
* For the access type, select **Programmatic access**. This way, the user can invoke the APIs and fetch the roles from the AWS account.
289
+
1. Create a new user account in the AWS IAM service.
319
290
320
-
* Select **Next Permissions**.
291
+
a. In the AWS IAM console, select **Users** and click **Add users**.
321
292
322
-
18. Create a new policy for this user.
293
+

323
294
324
-

295
+
b. In the **Specify user details** section, enter the user name as **AzureADRoleManager** and select **Next**.
325
296
326
-
a. Select **Attach existing policies directly**.
297
+

327
298
328
-
b. Search for the newly created policy in the filter section **AzureAD_SSOUserRole_Policy**.
299
+
c. Create a new policy for this user.
329
300
330
-
c. Select the policy, and then select **Next: Review**.
301
+

331
302
332
-
19. Review the policy to the attached user.
303
+
d. Select **Attach existing policies directly**.
333
304
334
-

305
+
e. Search for the newly created policy in the filter section **AzureAD_SSOUserRole_Policy**.
335
306
336
-
a. Review the user name, access type, and policy mapped to the user.
307
+
f. Select the policy, and then select **Next**.
337
308
338
-
b. Select **Create user**.
309
+
1. Review your choices and select **Create user**.
339
310
340
-
20. Download the user credentials of a user.
311
+
1. To download the user credentials of a user, enable the console access in **Security credentials** tab.
341
312
342
-

313
+

343
314
344
-
a. Copy the user **Access key ID** and **Secret access key**.
315
+
1. Enter these credentials into the Azure AD user provisioning section to fetch the roles from the AWS console.
345
316
346
-
b. Enter these credentials into the Azure AD user provisioning section to fetch the roles from the AWS console.
317
+

347
318
348
-
c. Select **Close**.
349
319
350
320
> [!NOTE]
351
321
> AWS has a set of permissions/limts are required to configure AWS SSO. To know more information on AWS limits, please refer [this](https://docs.aws.amazon.com/singlesignon/latest/userguide/limits.html) page.
@@ -354,11 +324,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
354
324
355
325
1. In the Azure AD management portal, in the AWS app, go to **Provisioning**.
356
326
357
-

327
+

358
328
359
329
2. Enter the access key and secret in the **clientsecret** and **Secret Token** fields, respectively.
360
330
361
-

331
+

362
332
363
333
a. Enter the AWS user access key in the **clientsecret** field.
364
334
@@ -370,7 +340,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
370
340
371
341
3. In the **Settings** section, for **Provisioning Status**, select **On**. Then select **Save**.
372
342
373
-

343
+

374
344
375
345
> [!NOTE]
376
346
> The provisioning service imports roles only from AWS to Azure AD. The service does not provision users and groups from Azure AD to AWS.
@@ -400,7 +370,7 @@ You can also use Microsoft My Apps to test the application in any mode. When you
400
370
401
371
## Known issues
402
372
403
-
* AWS Single-Account Access provisioning integration cannot be used in the the AWS China regions.
373
+
* AWS Single-Account Access provisioning integration cannot be used in the AWS China regions.
404
374
405
375
* In the **Provisioning** section, the **Mappings** subsection shows a "Loading..." message, and never displays the attribute mappings. The only provisioning workflow supported today is the import of roles from AWS into Azure AD for selection during a user or group assignment. The attribute mappings for this are predetermined, and aren't configurable.
0 commit comments