I am trying to access the AWS Console via AWS SSO with Azure AD as my identity provider. Following this Microsoft tutorial: https://docs.microsoft.com/en-us/azure/active-directory/saas-apps/aws-single-sign-on-tutorial, I was able to successfully set up SSO and automatic provisioning. To initiate sign in I use the My App browser extension. I can authenticate but I am brought to the User Portal and I have no applications. What am I missing? How do I access the AWS Console using this method?
What Michael said. You have configured a federated link from AAD to AWS SSO, but now you need to log into the Root Account of your AWS Org (where AWS SSO is configured) and assign users access to AWS accounts. This is done through the assignment of Permission Sets to users/groups and AWS accounts. Think of Permission Sets as JSON templates with which IAM Roles are created in the targetted AWS account(s).
What Michael said. You have configured a federated link from AAD to AWS SSO, but now you need to log into the Root Account of your AWS Org (where AWS SSO is configured) and assign users access to AWS accounts. This is done through the assignment of Permission Sets to users/groups and AWS accounts. Think of Permission Sets as JSON templates with which IAM Roles are created in the targetted AWS account(s).
That was it, thanks!