1. 程式人生 > >Introducing AWS Single Sign-On

Introducing AWS Single Sign-On

Today, AWS introduced AWS Single Sign-On (AWS SSO), a service that makes it easy for you to centrally manage SSO access to multiple AWS accounts and business applications. AWS SSO provides a user portal so that your users can find and access all of their assigned accounts and applications from one place, using their existing corporate credentials. AWS SSO is integrated with

AWS Organizations to enable you to manage access to AWS accounts in your organization. In addition, AWS SSO supports Security Assertion Markup Language (SAML) 2.0, which means you can extend SSO access to your SAML-enabled applications by using the AWS SSO application configuration wizard. AWS SSO also includes built-in SSO integrations with many business applications, such as Salesforce, Box, and Office 365.

In this blog post, I help you get started with AWS SSO by answering three main questions:

  1. What benefits does AWS SSO provide?
  2. What are the key features of AWS SSO?
  3. How do I get started?

1. What benefits does AWS SSO provide?

You can connect your corporate Microsoft Active Directory to AWS SSO so that your users can sign in to the user portal with their user names and passwords to access the AWS accounts and applications to which you have granted them access. The following screenshot shows an example of the AWS SSO user portal.

Screenshot of an example user portal

You can use AWS SSO to centrally assign, manage, and audit your users’ access to multiple AWS accounts and SAML-enabled business applications. You can add new users to the appropriate Active Directory group, which automatically gives them access to the AWS accounts and applications assigned for members of that group. AWS SSO also provides better visibility into which users accessed which accounts and applications from the user portal by recording all user portal sign-in activities in AWS CloudTrail. AWS SSO records details such as the IP address, user name, date, and time of the sign-in request. Any changes made by administrators in the AWS SSO console also are recorded in CloudTrail, and you can use security information and event management (SIEM) solutions such as Splunk and Sumo Logic to analyze the associated CloudTrail logs.

2. What are the key features of AWS SSO?

AWS SSO includes the following key features.

AWS SSO user portal: In the user portal, your users can easily find and access all applications and AWS accounts to which you have granted them access. Users can access the user portal with their corporate Active Directory credentials and access these applications without needing to enter their user name and password again.

Integration with AWS Organizations: AWS SSO is integrated with Organizations to enable you to manage access to all AWS accounts in your organization. When you enable AWS SSO in your organization’s master account, AWS SSO lists all the accounts managed in your organization for which you can enable SSO access to AWS consoles.

Integration with on-premises Active Directory: AWS SSO integrates with your on-premises Active Directory by using AWS Directory Service. Users can access AWS accounts and business applications by using their Active Directory credentials. You can manage which users or groups in your corporate directory can access which AWS accounts.

Centralized permissions management: With AWS SSO, you can centrally manage the permissions granted to users when they access AWS accounts via the AWS Management Console. You define users’ permissions as permission sets, which are collections of permissions that are based on a combination of AWS managed policies or AWS managed policies for job functions. AWS managed policies are designed to provide permissions for many common use cases, and AWS managed policies for job functions are designed to closely align with common job functions in the IT industry.

With AWS SSO, you can configure all the necessary user permissions to your AWS resources in your AWS accounts by applying permission sets. For example, you can grant database administrators broad permissions to Amazon Relational Database Service in your development accounts, but limit their permissions in your production accounts. As you change these permission sets, AWS SSO helps you keep them updated in all relevant AWS accounts, allowing you to manage permissions centrally.

Application configuration wizard: You can configure SSO access to any SAML-enabled business application by using the AWS SSO application configuration wizard.

Built-in SSO integrations: AWS SSO provides built-in SSO integrations and step-by-step configuration instructions for many commonly used business applications such as Office 365, Salesforce, and Box.

Centralized auditing: AWS SSO logs all sign-in and administrative activities in CloudTrail. You can send these logs to SIEM solutions such as Splunk and Sumo Logic to analyze them.

Highly available multi-tenant SSO infrastructure: AWS SSO is built on a highly available, AWS managed SSO infrastructure. The AWS SSO multi-tenant architecture enables you to start using the service quickly without needing to procure hardware or install software.

3. How do I get started?

To get started, connect your corporate Active Directory to AWS SSO by using AWS Directory Service. You have two choices to connect your corporate directory: use AD Connector, or configure an Active Directory trust with your on-premises Active Directory. After connecting your corporate directory, you can set up accounts and applications for SSO access. You also can use AWS Managed Microsoft AD in the cloud to manage your users and groups in the cloud, if you don’t have an on-premises Active Directory or don’t want to connect to on-premises Active Directory.

The preceding diagram shows how AWS SSO helps connect your users to the AWS accounts and business applications to which they need access. The numbers in the diagram correspond to the following use cases.

Use case 1: Manage SSO access to AWS accounts

With AWS SSO, you can grant your users access to AWS accounts in your organization. You can do this by adding your users to groups in your corporate Active Directory. In AWS SSO, specify which Active Directory groups can access which AWS accounts, and then pick a permission set to specify the level of SSO access you are granting these Active Directory groups. AWS SSO then sets up AWS account access for the users in the groups. Going forward, you can add new users to your Active Directory groups, and AWS SSO automatically provides the users access to the configured accounts. You also can grant Active Directory users direct access to AWS accounts (without needing to add users to Active Directory groups).

To configure AWS account access for your users:

  1. Navigate to the AWS SSO console, and choose AWS accounts from the navigation pane. Choose which accounts you want users to access from the list of accounts. For this example, I am choosing three accounts from my MarketingBU organizational unit. I then choose Assign users.
    Screenshot of choosing "Assign users"
  2. Choose Users, start typing to search for users, and then choose Search connected directory. This search will return a list of users from your connected directory. You can also search for groups.
    Screenshot of shooting for users
  3. To select permission sets, you first have to create one. Choose Create new permission set.
    Screenshot of choosing "Create new permission set"
  4. You can use an existing job function policy to create a permission set. This type of policy allows you to apply predefined AWS managed policies to a permission set that are based on common job functions in the IT industry. Alternatively, you can create a custom permission set based on custom policies.
    Screenshot of choosing a permission set
  5. For this example, I choose the SecurityAudit job function policy and then choose Create. As a result, this permission set will be available for me to pick on the next screen.
    Screenshot of choosing the SecurityAudit job function policy
  6. Choose a permission set to indicate what level of access you want to grant your users. For this example, I assign the SecurityAudit permission set I created in the previous step to the users I chose. I then choose Finish.
    Screenshot showing the SecurityAudit permission set
  7. Your users can sign in to the user portal and access the accounts to which you gave them access. AWS SSO automatically sets up the necessary trust between accounts to enable SSO. AWS SSO also sets up the necessary permissions in each account. This helps you scale your administrative tasks across multiple AWS accounts.
    Screenshot showing that the AWS accounts have been configured successfully
  8. The users can choose an account and a permission set to sign in to that account without needing to provide a password again. For example, if you grant a user two permission sets—one that is more restrictive and one that is less restrictive—the user can choose which permission set to use for a specific session. In the following screenshot, John has signed in to the AWS SSO user portal. He can see all the accounts to which he has access. For example, he can sign in to the Production Account with SecurityAudit permissions.
    Screenshot showing that this user can sign in to the Production Account with SecurityAudit permissions

Use case 2: Manage SSO access to business applications

AWS SSO has built-in support for SSO access to commonly used business applications such as Salesforce, Office 365, and Box. You can find these applications in the AWS SSO console and easily configure SSO access by using the application configuration wizard. After you configure an application for SSO access, you can grant users access by searching for users and groups in your corporate directory. For a complete list of supported applications, navigate to the AWS SSO console.

To configure SSO access to business applications:

  1. Navigate to the AWS SSO console and choose Applications from the navigation pane.
    Screenshot of choosing Applications and then Add a new application
  2. Choose Add a new application and choose one or more of the applications in the list. For this example, I have chosen Dropbox.
  3. Depending on which application you choose, you will be asked to complete step-by-step instructions to configure the application for SSO access. The instructions guide you to use the details provided in the AWS SSO metadata section to configure your application, and then to provide your application details in the Application metadata section. Choose Save changes when you are done.
  4. Optionally, you can provide additional SAML attribute mappings by choosing the Attribute mappings tab. You need to do this only if you want to pass user attributes from your corporate directory to the application.
    Screenshot of the configuration for Dropbox having been saved
  5. To give your users access to this application, choose the Assigned users tab. Choose Assign users to search your connected directory, and choose a user or group that can access this application.
    Screenshot of Assigned users tab

Use case 3: Manage SSO access to custom SAML-enabled applications

You also can enable SSO access to your custom-built or partner-built SAML applications by using the AWS SSO application configuration wizard.

To configure SSO access to SAML-enabled applications:

  1. Navigate to the AWS SSO console and choose Applications from the navigation pane.
    Screenshot of choosing Applications
  2. Choose Add a new application, choose Custom SAML 2.0 application, and choose Add.
  3. On the Custom SAML 2.0 application page, copy or download the AWS SSO metadata from the AWS SSO metadata section to configure your custom SAML-enabled application to recognize AWS SSO as an identity provider.
    Screenshot of AWS SSO metadata
  4. On the same page, complete the application configuration details in the Application metadata section, and choose Save changes.
    Screenshot of the Application metadata section
  5. You can provide additional SAML attribute mappings to be passed to your application in the SAML assertion by choosing the Attribute mappings tab. See the documentation for list of all available attributes.
    Screenshot of providing additional SAML attribute mappings
  6. To give your users access to this application, choose the Assigned users tab. Choose Assign users to search your connected directory, and choose a user or group that can access this application.
    Screenshot of the Assigned users tab, where you choose a user or group that can access this application

Summary

In this blog post, I introduced AWS SSO and explained its key features, benefits, and use cases. With AWS SSO, you can centrally manage and audit SSO access to all your AWS accounts, cloud applications, and custom applications. To start using AWS SSO, navigate to the AWS SSO console.

If you have feedback or questions about AWS SSO, start a new thread on the AWS SSO forum.

– Anand

相關推薦

Introducing AWS Single Sign-On

Today, AWS introduced AWS Single Sign-On (AWS SSO), a service that makes it easy for you to centrally manage SSO access to multiple AWS accounts a

Questions fréquentes (FAQ) sur AWS Single Sign-On

Qu'est-ce qu'AWS Single Sign-On (AWS SSO) ? AWS SSO est un service AWS qui vous permet d'utiliser les informations d'identification exis

Perguntas frequentes sobre o AWS Single Sign-On

O que é o AWS Single Sign-On (AWS SSO)? AWS SSO é um serviço da AWS que permite o uso das credenciais de seu Microsoft Active Directory

How to create and manage users within AWS Single Sign-On

AWS Single Sign-On (AWS SSO) is a cloud service that allows you to grant your users access to AWS resources, such as Amazon EC2 instances, across

AWS Single Sign-On 常見問題

什麼是 AWS Single Sign-On (AWS SSO)? AWS SSO 是一項 AWS 服務,可讓您通過單點登入 (SSO) 使用 Microsoft Active Directory 中的現有憑證來訪問基於雲的應用程式,如 AWS 賬戶和業務應用程式(Off

SSO(Single Sign On)單點登入系統

SSO(Single Sign On)單點登入系統 1.登入 @Controller public class LoginController { @Autowired private LoginService loginService; @Value("${TOKEN_

單點登入實現方式(Single Sign On

Server端: 1.共享cookie方式(共享session),把session-id放到每一次請求的url裡,即把session拿出來讓所有的Server共享,不安全; 2.SSO-Token方式(Ticket),不再已session-id作為身份的標識,另外生成一種標識

單點登入(Single Sign On

較大的企業內部,一般都有很多的業務支援系統為其提供相應的管理和IT服 務。例如財務系統為財務人員提供財務的管理、計算和報表服務;人事系統為人事部門提供全公司人員的維護服務;各種業務系統為公司內部不同的業務提供不同的 服務等等。這些系統的目的都是讓計算機來進行復雜繁瑣的計算工作,來替代人力的手工勞動,提高工作效

Oracle的單點登入解決方案(Single Sign-On Solution)

Single Sign-On(SSO)即單點登入,在多個應用系統中,使用者只需要登入一次就可以訪問所有相互信任的應用系統。在此條件下,管理員無需修改或干涉使用者登入就能方便的實施希望得到的安全控制。 Oracle現有兩套單點登入的解決方案:Oracle Access Man

SSO(Single Sign On)系列(三)--CAS單點登入

上篇文章介紹了SSO的原理以及5種基本流程,相信看完了之後不難理解單點登入,而CAS是SSO的一種實現方案,原理是一樣的。下面介紹一下。 CAS Server:負責完成對使用者的認證工作,需要獨立部署,CAS Server會處理使用者名稱/密碼等憑證。 CAS Client:負責處理對客戶端受保護資源的

ASP.NET 安全認證(四)——巧妙實現 Form 表單認證跨站點、跨伺服器的單點登入(Single Sign On

【原創】ASP.NET 安全認證(四) ——巧妙實現 Form 表單認證跨站點、跨伺服器的單點登入(Single Sign On) 作者:寒羽楓(cityhunter172) 第四部分 Form 認證的補充 前三篇在 CSDN 論壇公佈後,效果如同“神仙放屁——果然不同

轉載 | 什麼是單點登入(SSO Single-Sign-On)?

在日常工作中,使用者需要訪問大量的資訊資源,例如,使用者首先要登入到作業系統中,然後進入各個應用系統。進入每一個系統都需要對使用

單點登入(Single Sign On)解決方案

單點登入(Single Sign On)解決方案 需求 多個應用系統中,使用者只需要登入一次就可以訪問所有相互信任的應用系統。 A 網站和 B 網站是同一家公司的關聯服務。現在要求,使用者只要在其中一個網站登入,再訪問另一個網站就會自動登入,請問怎麼實現? 涉及到的關鍵點: 這裡就涉及到了 跨域認證

Salesforce Admin篇(四) Security 之Two-Factor Authentication & Single Sign On

本篇參考: https://c1.sfdcstatic.com/content/dam/web/en_us/www/documents/white-papers/2fa-admin-rollout-guide.pdf https://blog.bessereau.eu/assets/pdfs/salesfor

AWS Marketplace: MemSQL Enterprise Edition (Single node) on Ubuntu

AWS Marketplace is hiring! Amazon Web Services (AWS) is a dynamic, growing business unit within Am

Merge Multiple AWS Account Resources on One Account

Amazon Web Services is Hiring. Amazon Web Services (AWS) is a dynamic, growing business unit within Amazon.com. We are currently hiring So

AWS Marketplace: Redmine on Ubuntu powered by IAANSYS (PV)

AWS Marketplace is hiring! Amazon Web Services (AWS) is a dynamic, growing business unit within Am

CI/CD Pipeline for AWS CloudFormation Templates on the AWS Cloud

You are responsible for the cost of the AWS services used while running this Quick Start reference deployment. There is no additional cost fo