website/integrations/cloud-providers/aws/index.mdx
AWS, or Amazon Web Services, is a comprehensive cloud computing platform. It provides a wide array of on-demand IT services like computing power, storage, and databases, allowing businesses to build and run applications, and manage infrastructure through the internet.
The following placeholders are used in this guide:
authentik.company is the FQDN of the authentik installation.:::info This documentation lists only the settings that you need to change from their default values. Be aware that any changes other than those explicitly mentioned in this guide could cause issues accessing your application. :::
:::info User Provisioning IAM Identity Center needs a user pre-provisioned manually or via SCIM. Accounts are not created upon login. :::
To support the integration of AWS with authentik using SAML, you need to create an application/provider pair in authentik.
Log in to authentik as an administrator and open the authentik Admin interface.
Navigate to Applications > Applications and click Create with Provider to create an application and provider pair. (Alternatively you can first create a provider separately, then create the application and connect it with the provider.)
AWS Identity Center), an optional group for the type of application, the policy engine mode, and optional UI settings.
https://authentik.company).Post.authentik default SAML Mapping: Email.Click Submit to save the new application and provider.
:::info NameID The NameID field of type email is matched in AWS against the AWS username attribute, not the email attribute. :::
ACCEPT in the Confirm that you want to change your identity source by entering ACCEPT in the field below. field and click Add/Change Identity Provider.:::info SCIM Provisioning Limitation SCIM Provisioning is only supported in conjunction with IAM Identity Center, not Classic IAM. :::
To support the integration of AWS with authentik using SCIM, you need to create two property mappings and a SCIM provider in authentik.
Log in to authentik as an administrator and open the authentik Admin interface.
Navigate to Customization > Property Mappings, click Create, select SCIM Mapping, and click Next.
Configure the first user mapping property mapping:
authentik default (e.g. AWS SCIM User mapping).# This expression strips the default mapping from its 'photos' attribute,
# which is a forbidden property in AWS IAM.
return {
"photos": None,
}
Click Finish to save. Then, repeat the process to create a mapping for the user's username:
AWS SCIM Username).# This expression maps the authentik email address attribute to the AWS username attribute.
return {
"userName": request.user.email,
}
Click Finish.
AWS.The SCIM provider will automatically sync when users, groups, or memberships change. You can manually sync from SCIM provider page.