Connect to Amazon IAM Identity Center with SAML 2.0
FoxIDs can be added as an external identity provider for Amazon IAM Identity Center with SAML 2.0.
By configuring an OpenID Connect authentication method and Amazon IAM Identity Center as a SAML 2.0 application FoxIDs become a bridge between OpenID Connect and SAML 2.0 and automatically convert JWT (OAuth 2.0) claims to SAML 2.0 claims.
Configure Amazon IAM Identity Center
This guide describe how to setup FoxIDs as an external identity provider for Amazon IAM Identity Center. Users is connected with there email address and is required to exist in Amazon IAM Identity Center.
1 - Start by configuring a certificate in FoxIDs Control Client
You are required to upload the SAML 2.0 metadata from FoxIDs to Amazon IAM Identity Center. It is therefor necessary to use a long living certificate in FoxIDs, e.g. valid for 3 years.
- Select the Certificates tab
- Click Change Container type
- Find Self-signed or your certificate and click Change to this container type
- The self-signed certificate is valid for 3 years, and you can optionally upload you own certificate
2 - Then go to the Amazon IAM Identity Center in AWS portal
- Navigate to Amazon IAM Identity Center
- Click Settings
- Click Choose identity source (may be located in the Identity source section and Actions button)
- Select External identity provider
- Click Next
- Copy the IAM Identity Center Assertion Consumer Service (ACS) URL and save it for later
- Copy the IAM Identity Center issuer URL and save it for later
3 - Then creating an SAML 2.0 application in FoxIDs Control Client
- Select the Applications tab
- Click New application
- Click Show advanced
- Click Web application (SAML 2.0)
- Add the Name e.g.
Amazon IAM Identity Center
- Add the Application issuer from Amazon IAM Identity Center called IAM Identity Center issuer URL
- Add the Assertion consumer service (ACS) URL from Amazon IAM Identity Center called IAM Identity Center Assertion Consumer Service (ACS) URL
- Click Register
- Click Close
- Find the application in the list and click on it to edit
- Click Show advanced
- Set the Authn request binding to Post
- Set the NameID format to
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
- Set the NameID format in metadata to
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
at the bottom of the application - Click Update
- Go to the top of the application and click the SAML 2.0 Metadata URL link to open it in a browser
- Download the metadata as a metadata file
4 - Go back to the Amazon IAM Identity Center in AWS portal
- Find the IdP SAML metadata and click Choose file
- Select the metadata file from FoxIDs
- Click Next
- Write ACCEPT
- Click Change identity source
- Find the Identity source section and the AWS access portal URL, click the link to test login (you may need to create a user in FoxIDs)
Amazon IAM Identity Center do not support logout.