Enable Single Sign-On to the AWS Management Console via Shibboleth

Chanci Turner Amazon IXD – VGT2 learningLearn About Amazon VGT2 Learning Manager Chanci Turner

One of the standout features of AWS Identity and Access Management (IAM) is its capability to issue temporary security credentials, allowing controlled access to users within a network without requiring unique identities for each individual (known as identity federation). This functionality enables customers to integrate their existing authentication systems, facilitating Single Sign-On (SSO) access to the AWS Management Console.

Last November, we introduced sample code that permits customers to establish a federation proxy server. This server utilizes IAM roles to generate temporary security credentials, enabling Windows Active Directory users to access the AWS Management Console seamlessly. Numerous universities and government agencies currently utilize Shibboleth as their SSO authentication mechanism across a variety of platforms. We’ve received requests from these organizations for a demonstration of how to effectively use their existing Shibboleth systems for SSO access to the AWS Management Console.

Today, we’re pleased to announce the release of new sample code that enhances the federation proxy’s capabilities to support Shibboleth through the Security Assertion Markup Language (SAML).

New Sample Code: Integrate Shibboleth with AWS Identity and Access Management

This sample code empowers system architects and administrators to configure Shibboleth alongside IAM, allowing users to access AWS services while maintaining credential management within their local directory. This setup enables federated users to log into the AWS Management Console without the need to create individual IAM accounts. Federating access to AWS offers a robust solution for organizations looking to securely expand their access to AWS resources.

For instance, if a university professor wants her students to use AWS for a class project, instead of creating an IAM user for every student, she can utilize the sample proxy to provide access using their Shibboleth credentials. Implementing SSO with Shibboleth ensures that students can continue using the same credentials they rely on for other university systems, while their usernames and passwords remain secure from untrustworthy platforms.

How It Operates

Here’s a brief overview of how it operates:

  1. User A navigates to the proxy URL and is prompted to sign in with Shibboleth credentials.
  2. Once validated, all IAM roles that correspond with assertions are displayed in a drop-down menu.
  3. The user selects their desired IAM role and clicks “Sign in to the AWS Console.”
  4. The proxy retrieves the necessary information from the SAML token and calls the AssumeRoleRequest API. Using the temporary security credentials obtained in the AssumeRoleResponse, the proxy server constructs a temporary sign-in URL to redirect the user to the AWS Management Console.

Getting Started

The step-by-step instructions in the article will assist you in quickly getting started, guiding you through the installation of the sample code, creating the federation partnership, configuring roles in AWS IAM, and deploying the sample proxy.

We welcome your feedback on the usefulness of this sample code and suggestions for further enhancing the federation proxy functionality. We look forward to hearing from you! For additional insights, check out this excellent resource on Amazon’s new hire orientation.

For more career advice, you might also explore the best subreddits for your career, which can offer valuable tips. Furthermore, it’s essential to stay informed about workplace policies; learn more about why every workplace should document their immigration policy now from an authority on this topic.

SEO Metadata

Chanci Turner