Skip to content

Commit eaee0ed

Browse files
authored
Merge pull request #191228 from bhavana-129/aws-singe-update
Product Backlog Item 1802822: SaaS App Tutorial: AWS Single Sign-on U…
2 parents f4d591e + 641feec commit eaee0ed

File tree

1 file changed

+10
-13
lines changed

1 file changed

+10
-13
lines changed

articles/active-directory/saas-apps/aws-single-sign-on-tutorial.md

Lines changed: 10 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 10/26/2021
12+
ms.date: 03/10/2022
1313
ms.author: jeedes
1414

1515
---
@@ -37,7 +37,7 @@ In this tutorial, you configure and test Azure AD SSO in a test environment.
3737

3838
* AWS Single Sign-on supports [**Automated user provisioning**](./aws-single-sign-on-provisioning-tutorial.md).
3939

40-
## Adding AWS Single Sign-on from the gallery
40+
## Add AWS Single Sign-on from the gallery
4141

4242
To configure the integration of AWS Single Sign-on into Azure AD, you need to add AWS Single Sign-on from the gallery to your list of managed SaaS apps.
4343

@@ -48,7 +48,6 @@ To configure the integration of AWS Single Sign-on into Azure AD, you need to ad
4848
1. In the **Add from the gallery** section, type **AWS Single Sign-on** in the search box.
4949
1. Select **AWS Single Sign-on** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5050

51-
5251
## Configure and test Azure AD SSO for AWS Single Sign-on
5352

5453
Configure and test Azure AD SSO with AWS Single Sign-on using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in AWS Single Sign-on.
@@ -80,14 +79,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8079

8180
![image2](common/browse-upload-metadata.png)
8281

83-
c. Once the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section:
84-
85-
![image3](common/idp-intiated.png)
82+
c. Once the metadata file is successfully uploaded, the **Identifier** and **Reply URL** values get auto populated in Basic SAML Configuration section.
8683

8784
> [!Note]
8885
> If the **Identifier** and **Reply URL** values are not getting auto populated, then fill in the values manually according to your requirement.
8986

90-
1. If you don't have **Service Provider metadata file**, perform the following steps on the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
87+
> [!Note]
88+
> When changing identity provider in AWS (i.e. from AD to external provider such as Azure AD) the AWS metadata will change and need to be reuploaded to Azure for SSO to function correctly.
89+
90+
1. If you don't have **Service Provider metadata file**, perform the following steps on the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, perform the following steps:
9191

9292
a. In the **Identifier** text box, type a URL using the following pattern:
9393
`https://<REGION>.signin.aws.amazon.com/platform/saml/<ID>`
@@ -107,7 +107,6 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
107107

108108
![image](common/edit-attribute.png)
109109

110-
111110
> [!NOTE]
112111
> If ABAC is enabled in AWS SSO, the additional attributes may be passed as session tags directly into AWS accounts.
113112

@@ -210,8 +209,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
210209
g. Choose **Next: Groups**.
211210

212211
> [!NOTE]
213-
> Make sure the username entered in AWS SSO matches the user’s Azure AD sign-in name. This
214-
will you help avoid any authentication problems.
212+
> Make sure the username entered in AWS SSO matches the user’s Azure AD sign-in name. This will you help avoid any authentication problems.
215213
216214
5. Choose **Add user**.
217215
6. Next, you will assign the user to your AWS account. To do so, in the left navigation pane of the
@@ -244,11 +242,10 @@ In this section, you test your Azure AD single sign-on configuration with follow
244242

245243
#### IDP initiated:
246244

247-
* Click on **Test this application** in Azure portal and you should be automatically signed in to the AWS Single Sign-on for which you set up the SSO
245+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the AWS Single Sign-on for which you set up the SSO.
248246

249247
You can also use Microsoft My Apps to test the application in any mode. When you click the AWS Single Sign-on tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the AWS Single Sign-on for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
250248

251-
252249
## Next steps
253250

254-
Once you configure AWS Single Sign-on you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
251+
Once you configure AWS Single Sign-on you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

0 commit comments

Comments
 (0)