AWS IAM Identity Center Single Sign-On Example (SAML)¶
AWS IAM Identity Center (formerly AWS SSO) is a centralized identity management service provided by AWS. It supports Single Sign-On (SSO) to uniformly manage user access to multiple AWS accounts, cloud applications (such as Salesforce, GitHub), and hybrid cloud resources.
Note
The SAML 2.0 Single Sign-On feature of AWS IAM Identity Center is only available on AWS International sites.
1. Enable IAM Identity Center¶
In this example, it is assumed that the user account logging into the AWS platform has never used the IAM Identity Center service before, and this is its first time using it.
- Log in to the AWS console.
- In the search bar, enter IAM Identity Center.
- Click "Enable".
Note
- When enabling IAM Identity Center, pay attention to the region selection in the top navigation bar of the console. Once the service is enabled, you cannot directly switch regions; you must re-enable it in a new region and reconfigure all settings.
- If your organization already has an AWS master management region (such as us-east-1 or ap-northeast-1), it is recommended to keep it consistent for unified management.
2. Create a Custom SAML 2.0 Application¶
On the application management page, select "Custom", and click "Add application".
Why choose 'Custom'
| Option | Applicable Scenario |
|---|---|
| AWS Managed | Third-party SaaS applications pre-integrated by AWS (e.g., Salesforce, Slack, Zoom, etc.). AWS automatically provides metadata and configuration templates. |
| Custom | Third-party platforms that require manual SAML configuration (non-AWS pre-integrated applications, such as the example object "TrueWatch platform" in this article), where you need to provide SAML metadata or ACS URL yourself. |
- Select the application type as "I want to set up an application".
- Continue to select SAML 2.0 and proceed to the next step.
Configure the Application¶
- Define the display name for this application, such as
gc. - Enter a description as needed.
- Under "IAM Identity Center metadata", click to download the IAM Identity Center SAML metadata file and certificate.
- For the application metadata, select "Upload application SAML metadata file", and choose the metadata file downloaded from TrueWatch here.
- Submit the current configuration.
- The page will prompt that the application was successfully added.
3. Edit Attribute Mappings¶
Attribute mapping is the core configuration of SAML integration, used to pass AWS user attributes to TrueWatch.
After returning to the application details page, click Actions > Edit attribute mappings in the upper right corner of the page. Here, you configure the mapping relationship between the AWS user login identity and the TrueWatch role identity.
- The system provides the
Subjectfield (user unique identifier) by default; choose to map it to${user:email}. - After configuration is complete, click "Save changes".
Additional Role Attributes¶
- Define the user or group attributes that need to be mapped to the role; here, the
emailandfamilyNamefields are used. - Define the attribute mapped to this string value as
$(user:email}and$(user:familyName}respectively. - Save the current changes.
- Subsequently, go to TrueWatch to configure role mapping.
4. Assign User and Group Access Permissions¶
The users and groups you create in the Identity Center directory are only available within IAM Identity Center. Permissions can be assigned to them later. In this example, it is assumed by default that no users or groups have been added to the current directory.
Step 1: Add a User¶
- Go to the console > Users page.
- Click "Add user".
- Define a username, choose how the user receives the password, and enter the email, first name, last name, and display name.
- Proceed to the next step.
Note: The username, password, and email entered here are necessary configurations for the subsequent single sign-on by this user.
Step 2: Add the User to a Group¶
- If there are no groups in the current directory, use the creation entry on the right.
- Define a group name.
- Click the "Create" button in the lower right corner.
- Return to the Add User page, select this group, and proceed to the next step.
- Confirm adding this user. A status message will notify you that you have successfully added the user.
Step 3: Assign Users and Groups to the Application¶
- Go to the application, select the configured program (the example here is
gcconfigured above), and assign users and groups to it. - Search for and check all users and groups that need permission assignments.
- After review, the assignment can be created successfully.
5. Create a User SSO Identity Provider in TrueWatch¶
- Log in to the TrueWatch Workspace > Manage > Member Management > User SSO.
- Select SAML.
- Click "Add identity provider" to start configuration.
- Define the identity provider name as
aws_sso. - Upload the metadata document downloaded during application configuration.
- Define the access restriction email.
- Select the role and session duration.
- Click "Confirm".
For more configuration details here, refer to SSO Management.
6. Login Verification¶
- Log in to the TrueWatch Single Sign-On page: https://auth.truewatch.com/login/sso.
- Select the application created on the AWS side from the list.
- Login address.
- Enter the username and password.
- You can then log in successfully.
















