Skip to content

Commit c3f4597

Browse files
authored
Replace dashboard screenshot (auth0#8843)
Replaced apps dashboard screenshot Removed third-party (AWS) screenshots
1 parent fc54e9e commit c3f4597

File tree

2 files changed

+28
-50
lines changed

2 files changed

+28
-50
lines changed

articles/integrations/aws/sso.md

+28-50
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
description: How to use Single Sign-on (SSO) with AWS
2+
description: Learn how to use Single Sign-on (SSO) with AWS using the SAML2 Web App addon.
33
toc: true
44
topics:
55
- integrations
@@ -18,13 +18,11 @@ By integrating Auth0 with AWS, you'll allow your users to log in to AWS using an
1818

1919
## Configure Auth0
2020

21-
Log in to the [Management Dashboard](${manage_url}/#/applications), and create a new [Application](/application) (you can also use an existing Application if you'd like). On the **Addons** tab, enable the **SAML2 Web App** addon.
21+
1. Log in to the [Management Dashboard](${manage_url}/#/applications), and create a new [Application](/application) (you can also use an existing Application if you'd like). On the **Addons** tab, enable the **SAML2 Web App** addon.
2222

23-
![](/media/articles/integrations/aws/addons.png)
23+
![Applications](/media/articles/dashboard/guides/app-list.png)
2424

25-
You'll be asked to configure this add-on using the pop-up that appears immediately after you've enabled the SAML2 Web App.
26-
27-
On the **Settings** tab, populate **Application <dfn data-key="callback">Callback URL</dfn>** with `https://signin.aws.amazon.com/saml` and paste the following <dfn data-key="security-assertion-markup-language">SAML</dfn> configuration code into **Settings**:
25+
2. Configure this add-on using the pop-up that appears immediately after you've enabled the SAML2 Web App. On the **Settings** tab, populate **Application <dfn data-key="callback">Callback URL</dfn>** with `https://signin.aws.amazon.com/saml` and paste the following <dfn data-key="security-assertion-markup-language">SAML</dfn> configuration code into **Settings**:
2826

2927
```js
3028
{
@@ -44,64 +42,46 @@ On the **Settings** tab, populate **Application <dfn data-key="callback">Callbac
4442
}
4543
```
4644

47-
![](/media/articles/integrations/aws/configure.png)
45+
![SAML2 Web App Settings](/media/articles/integrations/aws/configure.png)
4846

49-
Scroll to the bottom and click **Enable**.
47+
3. Scroll to the bottom and click **Enable**.
5048

51-
Click over to the **Usage** tab. You'll need to configure Auth0 as the identity provider (IdP) for AWS, which requires you to provide the appropriate metadata to AWS. You can obtain a file containing this information by clicking **Identity Provider Metadata**.
49+
4. Click over to the **Usage** tab. You'll need to configure Auth0 as the identity provider (IdP) for AWS, which requires you to provide the appropriate metadata to AWS. You can obtain a file containing this information by clicking **Identity Provider Metadata**.
5250

53-
![](/media/articles/integrations/aws/idp-download.png)
51+
![SAML2 Web App Usage](/media/articles/integrations/aws/idp-download.png)
5452

5553
## Configure AWS
5654

57-
At this point, you're ready to continue the configuration process from the AWS side.
58-
59-
Log in to AWS, and navigate to the [IAM console](https://console.aws.amazon.com/iam). Using the left-hand navigation menu, under **Access Management**, select **Identity Providers**. Click **Create Provider**.
60-
61-
![](/media/articles/integrations/aws/aws-iam-identity-providers.png)
62-
63-
Set the following parameters:
64-
65-
| Parameter | Description and Sample Value |
66-
| - | - |
67-
| Provider Type | The type of provider. Set as `SAML` |
68-
| Provider Name | A descriptive name for the provider, such as `auth0SamlProvider` |
69-
| Metadata Document | Upload the file containing the Auth0 metadata you downloaded in the previous step here. |
70-
71-
![](/media/articles/integrations/aws/aws-iam-configure-provider.png)
55+
1. Log in to AWS, and navigate to the [IAM console](https://console.aws.amazon.com/iam). Using the left-hand navigation menu, under **Access Management**, select **Identity Providers**. Click **Create Provider**.
7256

73-
Click **Next Step**. Verify your settings and click **Create** if everything is correct.
57+
2. Set the following parameters:
7458

75-
To use the provider, you must create an IAM role using the provider in the role's trust policy.
59+
| Parameter | Description and Sample Value |
60+
| - | - |
61+
| Provider Type | The type of provider. Set as `SAML` |
62+
| Provider Name | A descriptive name for the provider, such as `auth0SamlProvider` |
63+
| Metadata Document | Upload the file containing the Auth0 metadata you downloaded in the previous step here. |
7664

77-
In the sidebar, under **Access Management**, navigate to **[Roles](https://console.aws.amazon.com/iam/home#/roles)**. Click **Create Role**.
65+
3. Click **Next Step**. Verify your settings and click **Create** if everything is correct.
7866

79-
![](/media/articles/integrations/aws/aws-iam-roles.png)
67+
4. To use the provider, you must create an IAM role using the provider in the role's trust policy. In the sidebar, under **Access Management**, navigate to **[Roles](https://console.aws.amazon.com/iam/home#/roles)**. Click **Create Role**.
8068

81-
On the next page, you will be asked to select the type of trusted entity. Select **SAML 2.0 Federation**.
69+
5. On the next page, you will be asked to select the type of trusted entity. Select **SAML 2.0 Federation**.
8270

83-
When prompted, set the provider you created above as the **SAML provider**. Select **Allow programmatic and AWS Management Console access**. Click **Next** to proceed.
71+
6. When prompted, set the provider you created above as the **SAML provider**. Select **Allow programmatic and AWS Management Console access**. Click **Next** to proceed.
8472

85-
![](/media/articles/integrations/aws/aws-iam-create-role.png)
73+
7. On the **Attach Permission Policies** page, select the appropriate policies to attach to the role. These define the permissions that users granted this role will have with AWS. For example, to grant your users read-only access to IAM, filter for and select the `IAMReadOnlyAccess` policy. Once you are done, click **Next Step**.
8674

87-
On the **Attach Permission Policies** page, select the appropriate policies to attach to the role. These define the permissions that users granted this role will have with AWS. For example, to grant your users read-only access to IAM, filter for and select the `IAMReadOnlyAccess` policy. Once you are done, click **Next Step**.
75+
8. The third **Create Role** screen is **Add Tags**. You can use tags to organize the roles you create if you will be creating a significant number of them.
8876

89-
![](/media/articles/integrations/aws/aws-iam-create-role-policies.png)
77+
9. On the **Review** page, set the **Role Name** and review your settings. Provide values for the following parameters:
9078

91-
The third **Create Role** screen is **Add Tags**. You can use tags to organize the roles you create if you will be creating a significant number of them.
79+
| Parameter | Definition |
80+
| - | - |
81+
| Role name | A descriptive name for your role |
82+
| Role description | A description of what your role is used for |
9283

93-
![](/media/articles/integrations/aws/aws-iam-create-role-tags.png)
94-
95-
Finally, on the **Review** page, set the **Role Name** and review your settings. Provide values for the following parameters:
96-
97-
| Parameter | Definition |
98-
| - | - |
99-
| Role name | A descriptive name for your role |
100-
| Role description | A description of what your role is used for |
101-
102-
Review the **Trusted entities** and **Policies** information, then click **Create Role**. At this point, you'll have created the necessary role to associate with your provider.
103-
104-
![](/media/articles/integrations/aws/aws-iam-create-role-review.png)
84+
10. Review the **Trusted entities** and **Policies** information, then click **Create Role**. At this point, you'll have created the necessary role to associate with your provider.
10585

10686
## Map the AWS Role to a User
10787

@@ -151,7 +131,7 @@ context.samlConfiguration.mappings = {
151131
};
152132
```
153133

154-
### Mapping Multiple Roles
134+
### Map Multiple Roles
155135

156136
You can also assign an array to the role mapping (so you'd have `awsRoles = [ role1, role2 ]` instead of `awsRoles: role1`)
157137

@@ -224,6 +204,4 @@ function (user, context, callback) {
224204

225205
You are now set up for <dfn data-key="single-sign-on">Single Sign-on (SSO)</dfn> to AWS. You can find the `Identity Provider Login URL` on the [Management Dashboard](${manage_url}). Open up your [application](${manage_url}/#/applications) to the **SAML2 Addon** settings area, and click over to the **Usage** tab.
226206

227-
![](/media/articles/integrations/aws/idp-download.png)
228-
229207
To test the SSO, navigate to the URL indicated. You should be redirected to the Auth0 sign in page. If you successfully sign in, you'll be redirected again, this time to AWS.
-145 KB
Binary file not shown.

0 commit comments

Comments
 (0)