Using SAML and SCIM identity federation with external identity providers
IAM Identity Center implements the following standards-based protocols for identity federation:
-
SAML 2.0 for user authentication
-
SCIM for provisioning
Any identity provider (IdP) that implements these standard protocols is expected to interoperate successfully with IAM Identity Center, with the following special considerations:
-
SAML
-
IAM Identity Center requires a SAML nameID format of email address (that is,
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress). -
The value of the nameID field in assertions must be an RFC 2822 (https://tools.ietf.org/html/rfc2822
) addr-spec compliant (“ name@domain.com”) string (https://tools.ietf.org/html/rfc2822#section-3.4.1). -
The metadata file cannot be over 75000 characters.
-
The metadata must contain an entityId, X509 certificate, and SingleSignOnService as part of the sign-in URL.
-
An encryption key is not supported.
-
IAM Identity Center does not support signing SAML authentication requests that it sends to external IdPs.
-
The IdP has to support multiple assertion consumer service (ACS) URLs if you plan to replicate IAM Identity Center to additional Regions, and fully take advantage of the benefits of a multi-Region IAM Identity Center. For more information, see Using IAM Identity Center across multiple AWS Regions. Using a single ACS URL may affect the user experience in additional Regions. Your primary Region will continue to function normally. For more information about the user experience in additional Regions with a single ACS URL, see Using AWS managed applications without multiple ACS URLs and AWS account access resiliency without multiple ACS URLs.
-
-
SCIM
-
The IAM Identity Center SCIM implementation is based on SCIM RFCs 7642 (https://tools.ietf.org/html/rfc7642
), 7643 (https://tools.ietf.org/html/rfc7643 ), and 7644 (https://tools.ietf.org/html/rfc7644 ), and the interoperability requirements laid out in the March 2020 draft of the FastFed Basic SCIM Profile 1.0 (https://openid.net/specs/fastfed-scim-1_0-02.html#rfc.section.4 ). Any differences between these documents and the current implementation in IAM Identity Center are described in the Supported API operations section of the IAM Identity Center SCIM Implementation Developer Guide.
-
IdPs that do not conform to the standards and considerations mentioned above are not supported. Please contact your IdP for questions or clarifications regarding the conformance of their products to these standards and considerations.
If you have any issues connecting your IdP to IAM Identity Center, we recommend that you check:
-
AWS CloudTrail logs by filtering on the event name ExternalIdPDirectoryLogin
-
IdP-specific logs and/or debug logs
Note
Some IdPs, such as the ones in the IAM Identity Center identity source tutorials, offer a simplified configuration experience for IAM Identity Center in the form of an “application” or “connector” built specifically for IAM Identity Center. If your IdP provides this option, we recommend that you use it, being careful to choose the item that’s built specifically for IAM Identity Center. Other items called “AWS”, “AWS federation”, or similar generic "AWS" names may use other federation approaches and/or endpoints, and may not work as expected with IAM Identity Center.