AWS SSO + Azure AD, no way to access AWS Console?

0

I am trying to access the AWS Console via AWS SSO with Azure AD as my identity provider. Following this Microsoft tutorial: https://docs.microsoft.com/en-us/azure/active-directory/saas-apps/aws-single-sign-on-tutorial, I was able to successfully set up SSO and automatic provisioning. To initiate sign in I use the My App browser extension. I can authenticate but I am brought to the User Portal and I have no applications. What am I missing? How do I access the AWS Console using this method?

Microsoft has another Enterprise Application call AWS Single-Account Access. If I set this up, I can access the Console: https://docs.microsoft.com/en-us/azure/active-directory/saas-apps/amazon-web-service-tutorial but I don't think that's what I want. Any help would be much appreciated. Thanks

1 個回答
2
已接受的答案

You are missing granting your AWS SSO users/groups access to the accounts. Assign User Access

AWS
已回答 2 年前
  • What Michael said. You have configured a federated link from AAD to AWS SSO, but now you need to log into the Root Account of your AWS Org (where AWS SSO is configured) and assign users access to AWS accounts. This is done through the assignment of Permission Sets to users/groups and AWS accounts. Think of Permission Sets as JSON templates with which IAM Roles are created in the targetted AWS account(s).

  • That was it, thanks!

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南