Skip to content

Commit 951dd59

Browse files
lucianpatianLucian Patian
and
Lucian Patian
authored
fixed sintax for "How to Create a New Entra ID Enterprise Application and Configure Custom Attributes for SAML Login for AWS Cognito" (#199)
* added the "How to Create a New Entra ID Enterprise Application and Configure Custom Attributes for SAML Login for AWS Cognito" page * removed image formatting * testing image width * fixed all pictures width * increased width to 85% * replaced the ** for bold text with <strong> * testing the the switch from ** to <strong> * configured the width for the table * reverted the table syntax * fixed list of tasks in Configure User Attributes & Claims for SSO login * small tweaks * fixed cognito userpool id reply url syntax * fixed ordering list for Configure User Attributes & Claims for SSO Login * moved the save changes as a bullet point --------- Co-authored-by: Lucian Patian <[email protected]>
1 parent 52124dc commit 951dd59

File tree

1 file changed

+25
-25
lines changed

1 file changed

+25
-25
lines changed

_posts/2024-10-08-EntraID-SAML.md

+25-25
Original file line numberDiff line numberDiff line change
@@ -41,17 +41,16 @@ Create the connection between Entra ID and your application by setting the login
4141
2. **Edit Basic SAML Configuration**
4242
* Edit the **Basic SAML Configuration**.
4343
* Add the **Identifier (Entity ID)** and **Reply URL (Assertion Consumer Service URL)**.
44-
* The **Identifier (Entity ID)** should follow the format: urn:amazon:cognito:sp:<Cognito_userpool_ID>.
45-
* The **Reply URL (Assertion Consumer Service URL)** should follow the format: https://<Cognito_domain_URL>/saml2/idpresponse.
44+
* The **Identifier (Entity ID)** should follow the format: urn:amazon:cognito:sp:"Cognito_userpool_ID".
45+
* The **Reply URL (Assertion Consumer Service URL)** should follow the format: https://Cognito_domain_URL/saml2/idpresponse.
46+
* **Save the changes** to the Basic SAML Configuration.
4647

4748
3. **Save the changes** to the Basic SAML Configuration.
4849

4950
<a href="/images/entra_cognito/saml_sso_config.png" target="_blank">
5051
<img src="/images/entra_cognito/saml_sso_config.png" alt="SAML SSO Configuration" style="width: 85%; display: block; margin: 0 auto;">
5152
</a>
5253

53-
54-
5554
### Configure the User Access for SSO login
5655
Assign the users and groups that should have permissions to log in to your application.
5756

@@ -65,25 +64,30 @@ Assign the users and groups that should have permissions to log in to your appli
6564
<img src="/images/entra_cognito/sso_add_users.png" alt="Add Users for SSO" style="width: 85%; display: block; margin: 0 auto;">
6665
</a>
6766

68-
### Configure User Attributes & Claims for SSO login
69-
Configure which Entra ID attributes should be used to log in to your application.
70-
1. **Edit User Attributes & Claims**
71-
* From the **Single Sign-On** option for your Enterprise application, edit the **User Attributes & Claims**.
67+
### 4. Configure User Attributes & Claims for SSO Login
7268

73-
<a href="/images/entra_cognito/sso_attributes_claims.png" target="_blank">
74-
<img src="/images/entra_cognito/sso_attributes_claims.png" alt="User Attributes and Claims" style="width: 85%; display: block; margin: 0 auto;">
75-
</a>
76-
77-
2. **Set Unique User Identifier**
78-
* Select the **Unique User Identifier (Name ID)** claim to edit it.
79-
* In the **Source attribute**, set the value to user.objectid.
80-
81-
<a href="/images/entra_cognito/sso_object_id_claim.png" target="_blank">
82-
<img src="/images/entra_cognito/sso_object_id_claim.png" alt="Set Object ID Claim" style="width: 85%; display: block; margin: 0 auto;">
83-
</a>
84-
85-
3. Save the changes
69+
Configure which Entra ID attributes should be used to log in to your application.
8670

71+
<ol>
72+
<li><strong>Edit User Attributes & Claims</strong>
73+
<ul>
74+
<li>From the <strong>Single Sign-On</strong> option for your Enterprise application, edit the <strong>User Attributes & Claims</strong>.</li>
75+
</ul>
76+
<a href="/images/entra_cognito/sso_attributes_claims.png" target="_blank">
77+
<img src="/images/entra_cognito/sso_attributes_claims.png" alt="User Attributes and Claims" style="width: 85%; display: block; margin: 0 auto;">
78+
</a>
79+
</li>
80+
<li><strong>Set Unique User Identifier</strong>
81+
<ul>
82+
<li>Select the <strong>Unique User Identifier (Name ID)</strong> claim to edit it.</li>
83+
<li>In the <strong>Source attribute</strong>, set the value to <code>user.objectid</code>.</li>
84+
<li><strong>Save the Changes</strong></li>
85+
</ul>
86+
<a href="/images/entra_cognito/sso_object_id_claim.png" target="_blank">
87+
<img src="/images/entra_cognito/sso_object_id_claim.png" alt="Set Object ID Claim" style="width: 85%; display: block; margin: 0 auto;">
88+
</a>
89+
</li>
90+
</ol>
8791

8892
## Update the AWS Cognito userpool
8993
Once you have defined all the claim mappings on the Entra ID side, it is time to connect the dots on AWS's side.
@@ -114,7 +118,6 @@ After all configurations are done on Entra ID side, you need to update the confi
114118
<img src="/images/entra_cognito/sso_cognito_saml_config.png" alt="Cognito SAML Configuration" style="width: 85%; display: block; margin: 0 auto;">
115119
</a>
116120

117-
118121
This is a better solution than uploading the XML file because Cognito refreshes the metadata every 6 hours or before the metadata expires. This way, you don’t have to manually refresh the metadata XML every time the Entra ID SSL certificates expire or any other change occurs on the Entra ID side that would impact the federation authentication.
119122

120123

@@ -133,15 +136,13 @@ Configure the attributes that are stored in Entra ID and are mapped via the SAML
133136
<img src="/images/entra_cognito/sso_cognito_attributes.png" alt="Cognito Attribute Mapping" style="width: 85%; display: block; margin: 0 auto;">
134137
</a>
135138

136-
137139
### Enable the External IdP for App Clients
138140
Now that you have an IdP using the Entra ID configuration, you need to assign it to your application created in the Cognito userpool.
139141
1. **Enable the IdP for App Clients**
140142
* In AWS Cognito, navigate to the **App integration** tab, **App client list** section.
141143
* Select the App client you want to configure and edit the **Hosted UI** section.
142144
* From the **Identity providers** dropdown, select your newly created IdP (e.g., EntraID) and save the changes.
143145

144-
145146
### Test the Configuration
146147

147148
* Click on the **View Hosted UI** button to quickly test your changes
@@ -155,7 +156,6 @@ The user attribute **identities** will store the metadata relating to the extern
155156
<img src="/images/entra_cognito/sso_cognito_identities.png" alt="Cognito Identities" style="width: 85%; display: block; margin: 0 auto;">
156157
</a>
157158

158-
159159
These fields will be updated on each successful authentication, so you can rely on the fact that the fields you receive via JWT attributes will be up-to-date.
160160

161161
### Conclusion

0 commit comments

Comments
 (0)