Cloud Knowledge

Your Go-To Hub for Cloud Solutions & Insights

Advertisement

A Step-by-Step Guide to Azure AD SAML Authentication Configuration for AWS SSO

What we do with the above step
The steps outlined above guide you through configuring Azure Active Directory (Azure AD) to manage user authentication for accessing the AWS console using SAML-based Single Sign-On (SSO). 

By following the steps outlined below, you will achieve:

  • Two AWS accounts with three identical roles in each (Admin, Dev, Auditor).

  • Three Azure AD groups (Admin, Dev, Auditor) mapped to AWS IAM roles.

  • One Azure AD Enterprise application to manage all users and groups.

Prerequisites:

Before we dive in, please note that while Microsoft provides a tutorial for integrating Azure AD with AWS, our guide differs as it doesn’t require storing AWS root account credentials in Azure.

To get started, you need:

  • Two AWS accounts.

  • One Azure account.

Step One: Create Users and Groups in Azure AD

  1. Navigate to the Azure Portal: Go to Azure ADUsers and GroupsAll Groups.

  2. Create Groups:

    • Click on New Group and create the following groups:

  1. Create Users:

    • Go to All UsersNew User and create the following users:

Step Two: Setup Enterprise Application in Azure AD

  1. Create Application:

    • Go to Azure ADEnterprise applicationsAll applicationsNew Application.

    • Search for “AWS” and select AWS Single-Account Access.

Configure SAML-based Sign-on:
    • Click on Single sign-on and select SAML-based Sign-on.

    • Add the following attributes:

  1. Save Configuration:

    • Download the metadata XML and click on Save.

Step Three: Setup Identity Provider in AWS IAM

Repeat the following steps for each AWS account:

  1. Create Identity Provider:

    • Log in to the AWS Console and navigate to IAMIdentity ProvidersCreate Provider.

    • Select SAML as Provider Type and enter AzureAD as Provider Name.

    • Upload the metadata XML file and click on Create.

Step Four: Setup IAM Roles

 1. Create Roles:

  • Navigate to RolesCreate new role → Grant Web Single Sign-On (WebSSO) access to SAML provider.

  • Select AzureAD as SAML Provider and assign policies to roles.

2. Note Role ARN and Trusted Identity:
 

Step Five: Configure App Registrations in Azure AD

1. Edit Manifest:

  • Navigate to Azure ADApp Registrations.

  • Select the AWS application and edit the manifest to include the necessary roles.

Step Six: Assign Roles to Groups

1. Assign Roles:

  • Go to Azure ADEnterprise applicationsAll applications.

  • Select your application, click on Users and GroupsAdd user.

  • Assign roles to the respective Azure AD groups.

 

Step Seven: Test the Solution

  • Admin User Testing:

    • Go to in a private/incognito tab.

    • Log in as admin@flux7demo.onmicrosoft.com, reset the password if prompted.

    • Click on the AWS icon and select a role.

  • Dev User Testing:

    • Log out and log in as dev@flux7demo.onmicrosoft.com.

    • Click on the AWS icon and select a role.

  • Auditor User Testing:

    • Log out and log in as auditor@flux7demo.onmicrosoft.com.

    • Click on the AWS icon and select a role.

By following these steps, you can now successfully use Azure AD to manage user authentication for AWS console access. This setup allows you to control AWS access via Azure AD and leverage Single Sign-On (SSO) for a seamless experience. Using Azure AD as your central account repository helps streamline account management across your organization.

Important Note:

The AWS Console requires the SAML Entity ID to be either https://signin.aws.amazon.com/saml or urn:amazon:webservices. Azure AD requires a unique identifier within the organization, limiting you to configure two enterprise apps for the AWS Console. However, the steps provided enable efficient management from a single enterprise app.

Leave a Reply

Your email address will not be published. Required fields are marked *