Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Clarification Needed on IAM Identity Center Configuration Step in CDK Deployment (Step 2) #8

Open
sathish0804 opened this issue Oct 10, 2024 · 1 comment

Comments

@sathish0804
Copy link

Hello,

I am working through the steps for configuring IAM Identity Center in a deployment that involves SAML integration with Amazon Cognito, following the CDK deployment. Specifically, I am referring to Step 2: Configure IAM Identity Center. I have some questions regarding why the application setup, metadata configuration, and attribute mappings (for subject and email) are needed in this context.

Steps Involved:
Adding a custom SAML 2.0 application in IAM Identity Center.
Manually configuring the Application Assertion Consumer Service (ACS) URL and SAML Audience.
Mapping the following attributes:
Subject: Maps to ${user:subject} with Persistent format.
Email: Maps to ${user:email} with Basic format.
Questions:
Purpose of Custom SAML Setup: Why is it necessary to configure a custom SAML 2.0 application in IAM Identity Center for the initial deployment, particularly when dealing with the Cognito user pool?

image
while opening the SAML 2.0 application, it is showing
image

@johnrotach
Copy link
Contributor

Hi, yep, I can help explain. DataZone makes use of IAM Identity Center for its identity provider. The solutions guidance makes use of Cognito for auth for the API for registering assets (via API Gateway). We wanted to be able to federate the identities used for DataZone so that the API could use the same identities so we configured this integration.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants