AWS In Practice
Courses
  • Welcome to AWS In Practice by IT Assist Labs!
  • Courses
    • AWS Powered E-commerce Application: A Guided Tour
      • Lesson Learning Paths
        • Lesson Learning Paths - Certification Prep
        • Lesson Learning Paths - Interview Prep
      • Lesson Summaries
        • Introduction
          • E-commerce Application Architecture
        • Multi-Account Strategy
          • Multi-Account Strategy Overview
          • Organization Units
          • Core Accounts
        • Core Microservices
          • Services Overview
          • AWS Well-Architected design framework application
          • Site Reliability Engineering Application
          • DevOps Application
          • Monitoring, Logging and Observability Application
        • AWS Service By Layer
          • AWS Service By Layer Overview
          • Presentation Layer
          • Business Logic Layer
          • Data Layer
        • E-commerce Application Use Cases
          • E-commerce Application Use Cases
          • Roles
      • Lesson Content Navigation Demonstration
    • Explore a Live AWS Environment Powering an E-commerce Application
  • Resources
    • AWS Certification Guide
      • Concepts
        • Security, Identity & Compliance
          • AWS IAM-Related Concepts in Certification Exams
        • Design High-Performing Architectures
          • Designing a high-performing architecture with EC2 and Auto Scaling Groups (ASGs)
    • Insights
      • Zero Trust Architecture (ZTA)
      • Implementing a Zero Trust Architecture(ZTA) with AWS
      • The Modern Application Development Lifecycle - Blue/Green Deployments
      • Microservices Communication Patterns
    • Interview Preparation
      • AWS Solutions Archictect
  • AWS Exploration
    • Use Cases
      • Multi-Region Resiliency with Active-Active Setup
        • Exploration Summary
    • Foundational Solutions Architect Use Cases
    • Security Engineer / Cloud Security Architect Use Cases
    • DevOps / Site Reliability Engineer (SRE) Use Cases
    • Cloud Engineer / Cloud Developer
    • Data Engineer Use Cases
    • Machine Learning Engineer / AI Practitioner Use Cases
    • Network Engineer (Cloud) Use Cases
    • Cost Optimization / FinOps Practitioner Use Cases
    • IT Operations / Systems Administrator Use Cases
  • Study Group
    • AWS Certified Solutions Architect - Associate
      • Study Guide Introduction
      • Domain 1: Design Secure Architectures
        • Task Statement 1.1: Design secure access to AWS resources
          • SecureCart's Journey
          • AWS Identity & Access Management (IAM) Fundamentals
          • AWS Security Token Service (STS)
          • AWS Organization
          • IAM Identity Center
          • AWS Policies
          • Federated Access
          • Directory Service
          • Managing Access Across Multiple Accounts
          • Authorization Models in IAM
          • AWS Control Tower
          • AWS Service Control Policies (SCPs)
          • Use Cases
            • Using IAM Policies and Tags for Access Control in AWS
        • Task Statement 1.2: Design Secure Workloads and Applications
          • SecureCart Journey
          • Application Configuration & Credential Security
          • Copy of Application Configuration & Credential Security
          • Network Segmentation Strategies & Traffic Control
          • Securing Network Traffic & AWS Service Endpoints
          • Protecting Applications from External Threats
          • Securing External Network Connections
          • AWS Network Firewall
          • AWS Firewall Manager
          • IAM Authentication Works with Databases
          • AWS WAF (Web Application Firewall)
          • Use Cases
            • AWS Endpoint Policy for Trusted S3 Buckets
            • Increasing Fault Tolerance for AWS Direct Connect in SecureCart’s Multi-VPC Network
            • Securing Multi-Domain SSL with ALB in SecureCart Using SNI-Based SSL
            • Configuring a Custom Domain Name for API Gateway with AWS Certificate Manager and Route 53
            • Application Load Balancer (ALB) – Redirecting HTTP to HTTPS
            • Security Considerations in ALB Logging & Monitoring
          • Amazon CloudFront and Different Origin Use Cases
          • Security Group
          • CloudFront
          • NACL
          • Amazon Cognito
          • VPC Endpoint
        • Task Statement 1.3: Determine appropriate data security controls
          • SecureCart Journey
          • Data Access & Governance
          • Data Encryption & Key Management
          • Data Retention, Classification & Compliance
          • Data Backup, Replication & Recovery
          • Managing Data Lifecycle & Protection Policies
          • KMS
          • S3 Security Measures
          • KMS Use Cases
          • Use Cases
            • Safely Storing Sensitive Data on EBS and S3
            • Managing Compliance & Security with AWS Config
            • Preventing Sensitive Data Exposure in Amazon S3
            • Encrypting EBS Volumes for HIPAA Compliance
            • EBS Encryption Behavior
            • Using EBS Volume While Snapshot is in Progress
          • Compliance
          • Implementing Access Policies for Encryption Keys
          • Rotating Encryption Keys and Renewing Certificates
          • Implementing Policies for Data Access, Lifecycle, and Protection
          • Rotating encryption keys and renewing certificates
          • Instance Store
          • AWS License Manager
          • Glacier
          • AWS CloudHSM Key Management & Zeroization Protection
          • EBS
        • AWS Security Services
        • Use Cases
          • IAM Policy & Directory Setup for S3 Access via Single Sign-On (SSO)
          • Federating AWS Access with Active Directory (AD FS) for Hybrid Cloud Access
      • Domain 2
        • Task Statement 2.1: Design Scalable and Loosely Coupled Architectures
          • SecureCart Journey
          • API Creation & Management
          • Microservices & Event-Driven Architectures
          • Load Balancing & Scaling Strategies
          • Caching Strategies & Edge Acceleration
          • Serverless & Containerization
          • Workflow Orchestration & Multi-Tier Architectures
        • Task Statement 2.2: Design highly available and/or fault-tolerant architectures
          • SecureCart Journey
          • AWS Global Infrastructure & Distributed Design
          • Load Balancing & Failover Strategies
          • Disaster Recovery (DR) Strategies & Business Continuity
          • Automation & Immutable Infrastructure
          • Monitoring & Workload Visibility
          • Use Cases
            • Amazon RDS Failover Events & Automatic Failover Mechanism
      • Domain 3
        • Task Statement 3.1: Determine high-performing and/or scalable storage solutions
          • SecureCart Journey
          • Understanding AWS Storage Types & Use Cases
          • Storage Performance & Configuration Best Practices
          • Scalable & High-Performance Storage Architectures
          • Hybrid & Multi-Cloud Storage Solutions
          • Storage Optimization & Cost Efficiency
          • Hands-on Labs & Final Challenge
        • Task Statement 3.2: Design High-Performing and Elastic Compute Solutions
          • SecureCart
          • AWS Compute Services & Use Cases
          • Elastic & Auto-Scaling Compute Architectures
          • Decoupling Workloads for Performance
          • Serverless & Containerized Compute Solutions
          • Compute Optimization & Cost Efficiency
        • Task Statement 3.3: Determine High-Performing Database Solutions
          • SecureCart Journey
          • AWS Database Types & Use Cases
          • Database Performance Optimization
          • Caching Strategies for High-Performance Applications
          • Database Scaling & Replication
          • High Availability & Disaster Recovery for Databases
        • Task Statement 3.4: Determine High-Performing and/or Scalable Network Architectures
          • SecureCart Journey
          • AWS Networking Fundamentals & Edge Services
          • Network Architecture & Routing Strategies
          • Load Balancing for Scalability & High Availability
          • Hybrid & Private Network Connectivity
          • Optimizing Network Performance
          • Site-to-Site VPN Integration for SAP HANA in AWS
        • Task Statement 3.5: Determine High-Performing Data Ingestion and Transformation Solutions
          • SecureCart Journey
          • Data Ingestion Strategies & Patterns
          • Data Transformation & ETL Pipelines
          • Secure & Scalable Data Transfer
          • Building & Managing Data Lakes
          • Data Visualization & Analytics
      • Domain 4
        • Task Statement 4.1: Design Cost-Optimized Storage Solutions
          • SecureCart Journey
          • AWS Storage Services & Cost Optimization
          • Storage Tiering & Auto Scaling
          • Data Lifecycle Management & Archival Strategies
          • Hybrid Storage & Data Migration Cost Optimization
          • Cost-Optimized Backup & Disaster Recovery
        • Task Statement 4.2: Design Cost-Optimized Compute Solutions
          • SecureCart Journey
          • AWS Compute Options & Cost Management Tools
          • Compute Purchasing Models & Optimization
          • Scaling Strategies for Cost Efficiency
          • Serverless & Container-Based Cost Optimization
          • Hybrid & Edge Compute Cost Strategies
          • AWS License Manager
        • Task Statement 4.3: Design cost-optimized database solutions
          • SecureCart Journey
          • AWS Database Services & Cost Optimization Tools
          • Database Sizing, Scaling & Capacity Planning
          • Caching Strategies for Cost Efficiency
          • Backup, Retention & Disaster Recovery
          • Cost-Optimized Database Migration Strategies
        • Task Statement 4.4: Design Cost-Optimized Network Architectures
          • SecureCart Journey
          • AWS Network Cost Management & Monitoring
          • Load Balancing & NAT Gateway Cost Optimization
          • Network Connectivity & Peering Strategies
          • Optimizing Data Transfer & Network Routing Costs
          • Content Delivery Network & Edge Caching
      • Week Nine
        • Final Review Session
        • Final Practice Test
Powered by GitBook

@ 2024 IT Assist LLC

On this page
  • Why Use Federated Access
  • Federated Access via IAM Identity Center (Recommended)
  • Setup for IAM Identity Center Federated Authentication
  • Federated Authentication
  • IAM Identity Center vs. IAM Role-Based Federation
  1. Study Group
  2. AWS Certified Solutions Architect - Associate
  3. Domain 1: Design Secure Architectures
  4. Task Statement 1.1: Design secure access to AWS resources

Federated Access

AWS enables federated authentication, allowing organizations to manage user access to AWS accounts and applications without maintaining credentials within AWS. Instead of creating and managing AWS-native identities, users authenticate through an external Identity Provider (IdP) such as Microsoft Entra ID (Azure AD), Okta, Google Workspace, or an on-premises Active Directory.

AWS provides two primary methods for integrating federated authentication:

  • IAM Identity Center (AWS SSO) – A centralized authentication and access management service that integrates with external IdPs via SAML 2.0 or OIDC, enabling single sign-on (SSO) across multiple AWS accounts and applications.

  • IAM Role-Based Federation – A traditional approach where users authenticate through an IdP, and AWS grants access based on IAM roles, using SAML assertions or OIDC tokens.

Both methods allow organizations to extend existing identity management solutions to AWS while ensuring secure, centralized, and scalable access control. The choice between IAM Identity Center and IAM Role-Based Federation depends on the organization’s need for multi-account access, authentication preferences, and security requirements.


Why Use Federated Access

  • Eliminates the need to create IAM users in AWS.

  • Allows users to authenticate with corporate identity providers (IdPs) such as Azure AD, Okta, Google Workspace, and Ping Identity.

  • Provides Single Sign-On (SSO) to multiple AWS accounts and services.

  • Supports Multi-Factor Authentication (MFA) enforcement.


Federated Access via IAM Identity Center (Recommended)

IAM Identity Center (formerly AWS SSO) simplifies federated access for AWS multi-account environments.

Setup for IAM Identity Center Federated Authentication

  1. Enable IAM Identity Center: Begin by turning on IAM Identity Center in the AWS Management Console. During setup, choose the identity source—either the default AWS directory (for manually managed users) or an external Identity Provider (IdP) such as Azure AD, Okta, or Google Workspace.

  2. Configure IdP Federation: In your external IdP, set up SAML 2.0 or OIDC authentication to establish trust with AWS. Obtain the IAM Identity Center metadata file from AWS and upload it to the IdP. Define group claims in the IdP to send user group membership data during authentication.

  3. Set Up SCIM for Automatic User and Group Provisioning (Optional): To automate user and group synchronization, enable SCIM provisioning in IAM Identity Center. Copy the SCIM endpoint URL and bearer token, then configure the IdP to automatically provision and update users and groups in IAM Identity Center.

  4. Create IAM Identity Center Groups: IAM Identity Center does not pull groups from the IdP dynamically at login. Instead, groups must be manually created or synchronized via SCIM. These groups will be used to assign permissions within AWS.

  5. Create Permission Sets: Define AWS access levels by creating Permission Sets in IAM Identity Center. These permission sets are similar to IAM policies and specify what actions users can perform in AWS.

  6. Assign Groups to AWS Accounts: Map IAM Identity Center groups (not IdP groups) to AWS accounts. Assign the appropriate Permission Set to each group, granting users access to AWS resources based on their assigned group.

Federated Authentication

  1. User authenticates via an external Identity Provider (IdP) (e.g., Azure AD, Okta, Google Workspace) using SAML 2.0 or OIDC.

  2. The IdP verifies the user’s identity and sends authentication information (a SAML assertion or OIDC token) to IAM Identity Center.

  3. IAM Identity Center does NOT directly validate the authentication token. Instead:

    1. For SAML federation, the IdP sends the SAML assertion to IAM Identity Center.

    2. For OIDC federation, IAM Identity Center redirects users to the IdP’s authorization endpoint.

  4. IAM Identity Center accepts the authentication response from the IdP and maps the user to an assigned permission set based on the user’s group or role mappings configured within IAM Identity Center.

  5. IAM Identity Center grants access to AWS accounts and applications based on the permission set assigned.


IAM Identity Center vs. IAM Role-Based Federation

Feature

Federated Access via IAM Identity Center

Federated Access via IAM Roles

Management

Centralized via IAM Identity Center

Requires setting up IAM roles manually

Authentication

Supports SAML 2.0 & OIDC via external IdPs

Supports SAML 2.0 & OIDC via IAM roles

User Management

No IAM users needed, uses permission sets

Users assume IAM roles based on federation trust

Multi-Account Access

Yes (AWS Organizations)

No (Single account or manual setup required)

MFA Enforcement

Yes

No (Handled by IdP)

Best For

AWS Organizations & centralized SSO

Single account setups & custom federation

PreviousAWS PoliciesNextDirectory Service

Last updated 2 months ago