{"id":99232,"date":"2023-10-06T18:16:07","date_gmt":"2023-10-06T22:16:07","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=99232"},"modified":"2024-06-11T14:41:02","modified_gmt":"2024-06-11T18:41:02","slug":"sso-with-amazon-aws-iam","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/sso-with-amazon-aws-iam","title":{"rendered":"SSO with Amazon Web Services (IAM)"},"content":{"rendered":"\n
Use JumpCloud SAML Single Sign On (SSO) to give your users convenient but secure access to all their web applications with a single set of credentials. <\/p>\n\n\n\n
Read this article to learn how to configure the Amazon Web Services (AWS IAM) connector. <\/p>\n\n\n\n
<\/p><\/div>
If you want to configure an AWS IAM Identity Center (FKA AWS SSO) connector, see Integrate with AWS IAM Identity Center<\/a>. <\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Prerequisites<\/strong><\/p>\n\n\n\n <\/p><\/div> Find your account number by going to the main AWS console, go to All Services<\/strong>, under Security, Identity & Compliance<\/strong> select IAM<\/strong>. It will be embedded in the IAM users sign-in link: https:\/\/<YOUR_AWS_ACCOUNT_NUMBER>.signin.aws.amazon.com\/console<\/kbd>.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Important Considerations <\/strong><\/p>\n\n\n\n <\/p><\/div> If this is a Bookmark Application, enter your sign-in URL in the Bookmark URL<\/strong> field.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n <\/p><\/div> The SSO IdP URL<\/strong> is not editable after the application is created. You will have to delete and recreate the connector if you need to edit this field at a later time.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n <\/p><\/div> Metadata can also be downloaded from the Configured Applications<\/strong> list. Search for and select the application in the list and then click Export Metadata<\/strong> in the top right corner of the window.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n When admins connect AWS in JumpCloud for single sign on (SSO), AWS accepts SSO based on roles. AWS roles are a set of permissions for making AWS service requests that are not associated with a user or group (Refer to Amazon\u2019s IAM FAQs<\/a> for more information). Admins can configure AWS roles in JumpCloud with Custom User Attributes and Constant Attributes. <\/p>\n\n\n\n Users are implicitly denied access to applications. After you connect an application to JumpCloud, you need to authorize user access to that application. You can authorize user access from the Application Configuration<\/strong> panel or from the Groups Configuration<\/strong> panel. <\/p>\n\n\n\n To learn how to authorize user access from the Groups Configuration<\/strong> panel, see Authorize Users to an SSO Application<\/a>.<\/p>\n\n\n\n <\/p><\/div> This varies by SP.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n <\/p><\/div> These are steps for removing the integration in JumpCloud. Consult your SP’s documentation for any additional steps needed to remove the integration in the SP. Failure to remove the integration successfully for both the SP and JumpCloud may result in users losing access to the application.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n\n
\n
Creating a new JumpCloud Application Integration<\/strong><\/h2>\n\n\n\n
\n
\n
\n
\n
Configuring the SSO Integration<\/strong><\/h2>\n\n\n\n
To configure JumpCloud 1<\/strong><\/h3>\n\n\n\n
\n
Download the JumpCloud metadata<\/strong> file<\/strong><\/h4>\n\n\n\n
\n
To configure AWS<\/strong> IAM<\/strong><\/h3>\n\n\n\n
\n
To configure JumpCloud 2<\/strong><\/h3>\n\n\n\n
\n
\n
To grant access via IAM roles for SSO with AWS<\/strong><\/h3>\n\n\n\n
\n
Authorizing User SSO Access<\/strong><\/h2>\n\n\n\n
To authorize user access from the Application Configuration panel<\/strong><\/h3>\n\n\n\n
\n
Validating SSO user authentication workflow(s)<\/strong><\/h2>\n\n\n\n
IdP-initiated<\/strong> user workflow<\/strong><\/h3>\n\n\n\n
\n
SP-initiated<\/strong> user workflow<\/strong><\/h3>\n\n\n\n
\n
\n
Removing the SSO Integration<\/strong><\/h2>\n\n\n\n
To deactivate<\/strong><\/strong> the SSO Integration<\/strong><\/h3>\n\n\n\n