You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/aws-single-sign-on-tutorial.md
+10-13Lines changed: 10 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 10/26/2021
12
+
ms.date: 03/10/2022
13
13
ms.author: jeedes
14
14
15
15
---
@@ -37,7 +37,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
37
37
38
38
* AWS Single Sign-on supports [**Automated user provisioning**](./aws-single-sign-on-provisioning-tutorial.md).
39
39
40
-
## Adding AWS Single Sign-on from the gallery
40
+
## Add AWS Single Sign-on from the gallery
41
41
42
42
To configure the integration of AWS Single Sign-on into Azure AD, you need to add AWS Single Sign-on from the gallery to your list of managed SaaS apps.
43
43
@@ -48,7 +48,6 @@ To configure the integration of AWS Single Sign-on into Azure AD, you need to ad
48
48
1. In the **Add from the gallery** section, type **AWS Single Sign-on** in the search box.
49
49
1. Select **AWS Single Sign-on** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
50
50
51
-
52
51
## Configure and test Azure AD SSO for AWS Single Sign-on
53
52
54
53
Configure and test Azure AD SSO with AWS Single Sign-on using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in AWS Single Sign-on.
@@ -80,14 +79,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
80
79
81
80

82
81
83
-
c. Once the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section:
84
-
85
-

82
+
c. Once the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section.
86
83
87
84
> [!Note]
88
85
> If the **Identifier** and **Reply URL** values are not getting auto populated, then fill in the values manually according to your requirement.
89
86
90
-
1. If you don't have **Service Provider metadata file**, perform the following steps on the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
87
+
> [!Note]
88
+
> When changing identity provider in AWS (i.e. from AD to external provider such as Azure AD) the AWS metadata will change and need to be reuploaded to Azure for SSO to function correctly.
89
+
90
+
1. If you don't have **Service Provider metadata file**, perform the following steps on the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, perform the following steps:
91
91
92
92
a. In the **Identifier** text box, type a URL using the following pattern:
@@ -107,7 +107,6 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
107
107
108
108

109
109
110
-
111
110
> [!NOTE]
112
111
> If ABAC is enabled in AWS SSO, the additional attributes may be passed as session tags directly into AWS accounts.
113
112
@@ -210,8 +209,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
210
209
g. Choose **Next: Groups**.
211
210
212
211
> [!NOTE]
213
-
> Make sure the username entered in AWS SSO matches the user’s Azure AD sign-in name. This
214
-
will you help avoid any authentication problems.
212
+
> Make sure the username entered in AWS SSO matches the user’s Azure AD sign-in name. This will you help avoid any authentication problems.
215
213
216
214
5. Choose **Add user**.
217
215
6. Next, you will assign the user to your AWS account. To do so, in the left navigation pane of the
@@ -244,11 +242,10 @@ In this section, you test your Azure AD single sign-on configuration with follow
244
242
245
243
#### IDP initiated:
246
244
247
-
* Click on **Test this application** in Azure portal and you should be automatically signed in to the AWS Single Sign-on for which you set up the SSO
245
+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the AWS Single Sign-on for which you set up the SSO.
248
246
249
247
You can also use Microsoft My Apps to test the application in any mode. When you click the AWS Single Sign-on tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the AWS Single Sign-on for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
250
248
251
-
252
249
## Next steps
253
250
254
-
Once you configure AWS Single Sign-on you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
251
+
Once you configure AWS Single Sign-on you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
0 commit comments