Page tree

Release 8.7



Contents:


   

Contents:


Optionally for single sign-on, the Trifacta® platform can leverage the AWS user/role mappings that are managed by a SAML authentication provider. In this authentication scenario:

  • The Trifacta platform uses its native SAML support for SSO authentication.
  • Access to AWS resources is governed by the set of permissions and IAM roles that are managed by your AWS admins.
  • A third-party SAML Identity Provider provides IAM role ARNs for each authenticating user in a SAML assertion.
  • Users of the Trifacta platform are mapped to one or more IAM roles. These IAM roles can be selected at the workspace (admin) or individual user level.
  • The Trifacta platform does not allow admins or users to edit the list of IAM roles for use.

Usage:

When this feature is enabled, a user's available IAM roles are automatically synched via SAML. When a user signs in to the Trifacta application, the user can select a role to use. 

Pre-requisites

  • Per-user authentication to AWS has been enabled.

    NOTE: Please be sure to verify that you have deployed the required policies as part of any IAM roles in use.


    For more information, see Configure AWS Per-User Auth for Temporary Credentials.

  • This feature is supported only for the SAML authentication method of SSO authentication native to the Trifacta platform.  It is not supported for any other SSO auth method. For more information, see Configure SSO for SAML
  • AWS permissions must be defined via IAM role and made available to an identity provider that adheres to SAML standards. The SAML identity provider must be configured with a list of SAML assertions containing the IAM roles that an external user may assume.

NOTE: When this feature is enabled and the platform is restarted, users of the Trifacta platform cannot authenticate to AWS resources until IAM roles have been assigned to their accounts. Where possible, you should enable this feature on an unused instance of the platform.

Enable

To enable, the following configuration change must be applied.

Steps:

  1. You can apply this change through the Admin Settings Page (recommended) or
    trifacta-conf.json
    . For more information, see Platform Configuration Methods.
  2. Locate the following parameter, and set it to true:

    "feature.importAwsRoles.saml.enabled": true,
  3. Save your changes and restart the platform.

Configure

After the feature has been enabled, the Trifacta platform assigns IAM roles to users automatically when they sign in. 

List of Roles

The list of available roles is passed from the SAML identity provider to the Trifacta platform in a SAML assertion attribute. From this list of roles, each user can select the one to apply to the account.

Use the steps below to review and modify the SAML attribute that contains the list of role ARNs for users.

NOTE: Modify this value only if necessary.

Steps:

  1. You can apply this change through the Admin Settings Page (recommended) or
    trifacta-conf.json
    . For more information, see Platform Configuration Methods.
  2. Locate the following parameter, and set it to the case-sensitive name of the SAML attribute:

    "feature.importAwsRoles.saml.rolesAttribute": "https://aws.amazon.com/SAML/Attributes/Role",

    Tip: For convenience, the default value for this SAML assertion attribute name matches the value used in AWS documentation: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml_assertions.html#saml_role-attribute.

  3. Save your changes and restart the platform.

Per-User Assignments

Individual users must select the IAM role ARN to assume from the list exposed by Trifacta administrator.

NOTE: Before a user is permitted to complete login to the application, the user must select a role from the provided list.

For more information, see Configure Your Access to S3.

Assignment per API

You can use the platform APIs to create platform AWS roles and assign them to users. For more information, see API Workflow - Manage AWS Configurations.

This page has no comments.