1 réponse
- Le plus récent
- Le plus de votes
- La plupart des commentaires
0
Sorry, I am not sure if I understand you correctly, you adding the IdP certificate to Identity Center (here the Service Provider). If is this what you are doing, this certificate has to be generated/maintained somewhere else, so you need to track the validity of the certificate on the CA where you generated it. For example, you can use a PrivateCA with AWS to upload the certificates and then using the API query the expiration date for example, but you cannot ask Identity Center for this, it's "problem" of the IdP not of Identity Center.
Best,
répondu il y a 10 mois
Contenus pertinents
- demandé il y a un an
- demandé il y a un an
- demandé il y a un an
- AWS OFFICIELA mis à jour il y a un an
- AWS OFFICIELA mis à jour il y a un an
- AWS OFFICIELA mis à jour il y a 2 ans
Thanks for the answer. Yes, the certificate is created in Active Directory Certificate Services and manually added in IAM Identity Center - Settings - SAML 2.0 Authentication. But I don't have access to ADCS. I would like to track the certificate on the AWS side through the CLI, or API. Do you suggest adding the new certificate to AWS ACM in addition to the IAM Identity Center and tracking it using the acm:ListCertificates command? This may be one of the options, but not the most convenient. I would like to get information about the certificate directly from where it is imported (IAM Identity Center - Settings - SAML 2.0 Authentication), without having to add it somewhere else. Is it somehow possible? If not, do you plan to add this functionality? I think it should be in the identitystore.