Optionally for single sign-on, the
can leverage the AWS user/role mappings that are managed by a SAML authentication provider. In this authentication scenario:
- The uses its native SAML support for SSO authentication.
- Access to AWS resources is governed by the set of permissions and IAM roles that are managed by your AWS admins. The does not allow editing of the list of available IAM roles for use.
- Authentication to AWS is governed by a third-party SAML provider, which has access to this set of IAM roles and underlying permissions.
- Users of the are mapped to one or more IAM roles. These IAM roles can be selected at the workspace (admin) or individual user level.
Usage:
When this feature is enabled, a user's available IAM roles are automatically synched via SAML. When a user signs in to the , the user can select their default role to use.
- Per-user authentication to AWS has been enabled. For more information, see Configure AWS Per-User Authentication.
- This feature is supported only for the SAML authentication method of SSO authentication native to the . It is not supported for any other SSO auth method. For more information, see Configure SSO for SAML.
- AWS permissions must be defined via IAM role and made available to an identity provider that adheres to SAML standards. The SAML identity provider must be configured with a list of SAML assertions containing the IAM roles that an external user may assume.
Info |
---|
NOTE: When this feature is enabled and the platform is restarted, users of the cannot authenticate to AWS resources until IAM roles have been assigned to their accounts. Where possible, you should enable this feature on an unused instance of the platform. |
To enable, the following configuration change must be applied.
Steps:
Locate the following parameter, and set it to true
:
Code Block |
---|
"feature.importAwsRoles.saml.enabled": true, |
- Save your changes and restart the platform.
After the feature has been assigned, roles must be assigned to users.
The list of available roles is passed from the SAML identity provider to the
. From this list of roles, each user can select the one to apply to the account.
Individual users must select the IAM role ARN to assume from the list exposed by
.
Info |
---|
NOTE: Before a user is permitted to complete login to the application, the user must select a role from the provided list. |
For more information, see Configure Your Access to S3.
You can use the platform APIs to create platform AWS roles and assign them to users. For more information, see API Workflow - Manage AWS Configurations.