Skip to main content

AWS Identity Center (SSO)

This guide provides an overview of setting up AWS Identity Center (SSO) with ClickOps, detailing prerequisites and supported external identity providers. It explains how to integrate AWS SSO with providers like Okta, Azure AD, JumpCloud, and Google Workspace, including specific steps for configuring each.

How it Works​

AWS Single Sign-On (AWS SSO) is a service that simplifies access management for AWS accounts and applications for managing your organization's workforce identity at scale across a multi-account AWS deployment. It enables users to sign in to AWS once and access multiple AWS accounts and applications without the need to re-enter credentials. To use it with an identity provider (e.g. such as Okta) for AWS SSO, administrators typically need to configure the integration within the AWS Management Console. This involves setting up a new AWS SSO instance, connecting it the IdP, and specifying the users or groups that should have access to AWS resources. AWS SSO provides logging and auditing capabilities, allowing organizations to track user access to AWS resources and monitor security-related events

  1. SAML-Based Authentication

    The integration between the IdP and AWS SSO relies on the Security Assertion Markup Language (SAML) for authentication and authorization. SAML enables the exchange of authentication and authorization data between Okta and AWS, allowing users to log in once to Okta and gain access to AWS resources without additional logins.

  2. User Provisioning

    AWS SSO can be configured to automatically provision and de-provision user accounts based on changes in the IdP directory. This helps keep user access in sync with changes made in the Okta environment.

  3. AWS SSO Permission Sets

    AWS SSO allows administrators to define fine-grained access policies, specifying which AWS accounts and services users from the IdP can access

  4. Multi-Factor Authentication (MFA)

    Organizations using Okta for authentication with AWS SSO can enhance security by enforcing multi-factor authentication (MFA) for added identity verification.

Once configured, users can experience single sign-on when accessing AWS resources. They log in to their IdP account and seamlessly gain access to AWS without needing to provide credentials again.

It's important to note that the specifics of the integration process may be subject to updates or changes, so it's recommended to refer to the official AWS documentation and Okta documentation for the most accurate and up-to-date information based on your current date.

Prerequisites​

First, enable the AWS IAM Identity Center (successor to AWS Single Sign-On) service in the aws-admin account. This is the account where the aws-sso component will be deployed.

  • 1. AWS Account Setup

    • An AWS account not part of AWS Organizations: aws-admin
    • Go to the AWS IAM console and create a new user: super-admin-user
      • Provide user access to the AWS Management Console - optional >> I want to create an IAM user
      • Click Next: Permissions to continue to the next step. Click Attach policies directly and choose AdministratorAccess.
      • Click Create User.
      • Click on the Email sign-in instructions link to receive the sign-in link.
  • 2. Enable AWS Organizations

    • Navigate to the aws-admin account in the AWS Web Console
    • Enable AWS Organizations
  • 3. Enable IAM Identity Center:

    • Go to AWS IAM Identity Center (successor to AWS Single Sign-On). Select your primary region: ap-southeast-2
    • Enable the service

Configure your Identity Provider​

These are the instructions for the most common Identity Providers. Alternatives are available, but the steps may vary depending on the provider.

It's important to note that the specifics of the integration process may be subject to updates or changes, so it's recommended to refer to the official AWS documentation and respective IdP documentation for the most accurate and up-to-date information based on your current date.

For providers not included in the following section, please follow the AWS documentation for setting up an IdP integration with AWS. This list includes Azure AD, CyberArk, OneLogin, and Ping Identity.

Okta is a common business suite that has an active director to manage users and permissions. We can utilize this to login to AWS by leveraging Applications that are used to sign in to things from your Okta Account.

Setup Okta with AWS Identity Center​

⛑️ Your organization might be already managing workforce identity in Microsoft Active Directory or a standards-based identity provider such as Okta Universal Directory or Azure AD. In these situation, you can integrate these external identity providers (IDP) with AWS IAM Identity Center to provide a unified administration experience to define, customize, and assign fine-grained access. In this section, you will configure an Okta Universal Directory as the external Identity Provider (IDP) with AWS IAM Identity Center.

  1. πŸ›‘οΈ Create an Okta account
  2. πŸ›‘οΈ Create Users/Groups in Okta
  3. πŸ›‘οΈ Create IAM Identity Center Application in Okta
  4. ⛅️ Configure/Change the Identity Source in Identity Center
  5. πŸ›‘οΈ Configure Okta SSO
  6. πŸ›‘οΈ Configure Provision/SCIM in Okta
  7. πŸ›‘οΈ Assign User/Groups to IAM Identity Center Application in Okta
  8. ⛅️ Assign access to AWS Accounts through Permission Sets
  9. πŸ›‘οΈβ›…οΈ Test access
  • Click here to create your free Okta account: No credit card is required.
  • Select Sign up free for Developer Edition.
    • You will receive an Email. Click on the link to activate your account.
    • Set the password (and MFA) of your Okta Account and you are ready to go.

Create Your Free Okta Account

9. πŸ›‘οΈβ›…οΈ Test Access

Now that we have everything configured, we can test the access to AWS with the proper permissions. You can start the test and login from Okta (IDP-initiated) or AWS

  1. Navigate to the IAM Identity Center Console
  2. Select Settings from the left menu
  3. Open the AWS access portal URL in a new browser, the URL should be of the format https://d-xxxxxxxxxx.awsapps.com/start
  4. This should navigate you to the Okta login page IAM Identity Center Portal page
  5. Once you provide the user credentials, on successful login , you should be navigated to the SSO portal page IAM Identity Center Portal page
  6. Navigate to the Management Console using the the PowerUserAccess role
⛅️ Cleanup Identity Center resources
  1. Navigate to the IAM Identity Center Console
  • Choose the AWS Region you intend to configure the rule: ap-southeast-2
  1. Select Settings from the left menu
  • In the Setting page , choose Management tab
  • Click on the Delete button under the Delete IAM Identity Center instance configuration Settings management tab
  • Type the ^^instance id^^ in the text box and click on the Confirm button in Dialog window Confirm delete settings