Introduction
This guide provides information on how to:
- Set up BI Admin Console application on AWS SSO.
- Set up BI User Console application on AWS SSO.
- Set up Beyond Identity as an external IdP to provide Passwordless access to Web applications on the AWS SSO.
Assumptions:
- BI Admin console is currently not part of AWS app gallery and needs to be added manually using SAML2.0
- BI User console is currently not part of AWS app gallery and needs to be added manually using SAML2.0
- AWS SSO currently does NOT support SCIM client for user provisioning in BI directory. Users need to be provisioned manually both on the AWS console and BI admin console.
- Users are already created on the AWS SSO console by the organization.
- Once the domain is federated ALL users will be authenticated using BI Passwordless service. Currently, AWS does not support federating select users or groups.
Create Groups:
- Login to the AWS SSO console as a root user.
- Navigate to Groups🡪Create Group
- Group Name: BI_Admins
- Add Users: < Add the admin users to the group>
- Navigate to Groups🡪Create Group
- Group Name: BI_Users
- Add Users: < Add users that need to be enrolled in BI service >
Admin Console setup:
- Login to the AWS SSO console as a root user.
- Navigate to Applications🡪Add a new application.
- Click on Add a custom SAML 2.0 application.
- Display Name and Description “Beyond Identity Admin Console”
- Download AWS SSO SAML metadata file.
-
In the Application properties fill in the
- Application Start URL: https://admin.byndid.com/auth/?org_id= (Fill in the BI Tenant name)
- Relay State: Empty
- Session Duration: 1 hour
- Login to the BI support console (BI authorized users only).
-
Under the BI Tenant follow the below steps
-
Admin Portal SSO integration
- SSO type Add SAML SSO
- Upload the AWS SSO SAML metadata file downloaded in step 5.
- Name: AWS-SSO
- Name ID format: emailAddress
- Subject User Attribute: UserName
- Request Binding: http_post
- Save Changes and note down the SP SSO URL and SP issuer.
-
Admin Portal SSO integration
- Log back into the AWS SSO console as a root user.
-
Under Application Metadata click on If you don’t have a metadata file, you can manually type your metadata values.
- Application ACS URL: Paste the SP SSO URL (Ending in /sso)
- Application SAML audience: Paste SP issuer URL (Ending in /metadata.xml)
-
Under Attribute Mappings
- User attribute in application: Subject
- Maps to this string value attribute in AWS SSO: ${user:subject}
- Format: emailAddress
- Under Assigned Users add the BI_Admins group.
User Console setup:
- Login to the AWS SSO console as a root user.
- Navigate to Applications🡪Add a new application.
- Click on Add a custom SAML 2.0 application.
- Display Name and Description “Beyond Identity User Console”
- Download AWS SSO SAML metadata file.
-
In the Application properties fill in the
- Application Start URL: https://admin.byndid.com/auth/?org_id= (Fill in the BI Tenant name)
- Relay State: Empty
- Session Duration: 1 hour
- Login to the BI support console (BI authorized users only).
-
Under the BI Tenant follow the below steps
-
User Portal SSO integration
- SSO type Add SAML SSO
- Upload the AWS SSO SAML metadata file downloaded in step 5.
- Name: AWS SSO
- Name ID format: emailAddress
- Subject User Attribute: UserName
- Request Binding: http_post
- Save Changes and note down the SP SSO URL and SP issuer.
-
User Portal SSO integration
- Log back into the AWS SSO console as a root user.
-
Under Application Metadata click on If you don’t have a metadata file, you can manually type your metadata values.
- Application ACS URL: Paste the SP SSO URL (Ending in /sso)
- Application SAML audience: Paste SP issuer URL (Ending in /metadata.xml)
-
Under Attribute Mappings
- User attribute in application: Subject
- Maps to this string value attribute in AWS SSO: ${user:subject}
- Format: emailAddress
- Under Assigned Users add the BI_Users group.
Setup beyond identity as idp:
- Login to the AWS SSO console as a root user.
- Navigate to Dashboard🡪Choose your identity source
- Click on External Identity provider.
- Under Service Provider Metadata download the AWS SSO SAML metadata file.
- Login to the BI Admin console using the admin account.
-
Under the BI Tenant follow the below steps
-
Navigate to Integrations 🡪 SAML
- Add SAML connection
- Upload the AWS SSO SAML metadata file downloaded in step 4.
- Name: AWS SSO
- Name ID format: emailAddress
- Subject User Attribute: UserName
- Request Binding: http_redirect
- Signed Response: Signed
- Save Changes and download the Metadata file (Icon: </>).
-
Navigate to Integrations 🡪 SAML
- Log back into the AWS SSO console as a root user.
- Under Identity Provider Metadata browse to and upload the BI IdP metadata file downloaded at the end of STEP 6.
- Click Review and complete the process.
User enrollment:
- Manually add users on Beyond Identity Admin console
- Enrolled user will receive an email from Beyond Identity welcoming them to the new Identity Provider.
- See image below for reference:
-
Each enrolled user will be asked to follow the two steps below:
- Download the Beyond Identity Authenticator to their device.
- When the user clicks “View Download Options”, the Beyond Identity Authenticator downloads page will open in a browser with all supported platforms displayed. The user should download and install the Beyond Identity Authenticator on their device if they have not already.
- Register their Credential in the Beyond Identity IdP.
- By clicking “Register New Credential”, the user’s credential will get enrolled in the Beyond Identity service on the back end.Once completed, the user will see a credentials in the Authenticator.
- See example image below:
User Authentication (Signing in)
- Each enrolled user can visit their AWS instance or any application supported by your SSO to sign into their corporate applications.
- The user should click affirmatively on the prompt to be signed into their application, without the use of a password. The Beyond Identity app along with a success notification will be displayed.
Comments
0 comments
Please sign in to leave a comment.