Movatterモバイル変換


[0]ホーム

URL:


Skip to content
DEV Community
Log in Create account

DEV Community

Cover image for AWS SSO with Azure Active Directory
AWS Community Builders  profile imageArkadiusz Bolewski
Arkadiusz Bolewski forAWS Community Builders

Posted on • Edited on

     

AWS SSO with Azure Active Directory

Introduction

Recently in one of my project we had to setup AWS SSO with Azure AD as our primary identity provider. There are couple good reads available on the web likethis one from 2019 but things are changing dynamically, so they are quickly becoming outdated. This is the reason why I decided to write my own detailed guide!

Pre-requisites

Before we start we need two pieces in place which are not described in this guide:

  • Azure Active Directory
  • AWS SSO

Add Enterprise Application on Azure

  1. Go to your Azure subscription. Navigate toAzure Active Directory, next in the menu on the left hand side clickEnterprise applications.

    Alt Text

  2. ClickNew application.

    Alt Text

  3. ClickCreate your own application, add meaningful name, checkIntegrate any other application you don't find in the gallery and clickCreate when ready

    Alt Text

  4. We have created our Enterprise application, now let's go back to our AWS account.

    Alt Text

Configure AWS SSO with external identity provider

  1. Log into your AWS account, navigate to AWS SSO service and clickChoose your identity source.

    Alt Text

  2. UnderIdentity source settings, clickChange.

    Alt Text

  3. You will be redirected to the new page with additional settings. On that page chooseExternal identity provider. Scroll down toService provider metadata section and clickDownload metadata file. We are going to upload this file to our Azure application. Leave this page open, we will need it later.

    Alt Text

Now let's go back to our Enterprise application on Azure.

Configure Enterprise application

  1. Navigate to the previously created Enterprise application and clickSetup single sign on.

    Alt Text

  2. On next page chooseSAML.

    Alt Text

  3. Upload metadata file downloaded from AWS SSO configuration and clickSave on next dialog.

    Alt Text

  4. Now you should see the link to downloadFederation Metadata XML file which we will upload to AWS SSO asIdP SAML metadata (you didn't close it, right? (: ). If you can't see the link, pleaserefresh the page.

    Alt Text

Finish AWS SSO configuration

  1. Go back to the AWS SSO configuration page and uploadFederation Metadata XML file from Azure asIdP SAML metadata. ClickReview when ready.

    Alt Text

  2. Carefully read warning message. When ready writeACCEPT in the text box and clickChange identity source button.

    Alt Text

Congrats! You have configured AWS SSO with AzureAD as your main identity provider. Now let's configure automatic provisioning of your users and groups.

Enable automatic provisioning

  1. Navigate toAWS SSO console, clickSettings and then clickEnable identity synchronization link. New dialog will open with yourSCIM endpoint address andAccess token. Copy these values, you will need them later.

    Alt Text

  2. Let's go back to Azure portal. Navigate to your Enterprise application and clickProvisioning on the left hand side menu.

    Alt Text

  3. SetProvisioning mode toAutomatic. ProvideTenant URL (SCIM endpoint) andSecret Token (Access token). You can clickTest Connection button to verify if Azure can establish connection with SCIM endpoint.

    Alt Text

  4. Mappings section will be available as soon as you hitSave button with your SCIM endpoint and Access token fields populated. It's good idea to set upNotification Email field so you will get notified if you synchronization fails. You can setProvisioning Status toOn.

    Alt Text

    Pro tip: AzureAD allows you to create user without First Name and Last Name defined but AWS SSO won't like it. Please pay attention to any synchronization errors.

  5. Last but not least is to define our users and groups that we want to be synchronized from AzureAD to AWS SSO. To do this navigate to your Enterprise application, clickUsers and Groups in the left hand side menu and thenAdd user button.

    Alt Text

  6. You can now login to your AWS accounts using AWS SSOUser portal URL or myapplications.microsoft.com webpage.

Closing remarks

Hope you will find this guide useful.

I would like to thank my team mate Guru for help with the screenshots! ;)

Top comments(0)

Subscribe
pic
Create template

Templates let you quickly answer FAQs or store snippets for re-use.

Dismiss

Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment'spermalink.

For further actions, you may consider blocking this person and/orreporting abuse

Build On!

Would you like to become an AWS Community Builder? Learn more about the program and apply to join when applications are open next.

More fromAWS Community Builders

DEV Community

We're a place where coders share, stay up-to-date and grow their careers.

Log in Create account

[8]ページ先頭

©2009-2025 Movatter.jp