apps/docs/content/guides/integrate/services/aws-saml.mdx
This guide shows how to enable login with ZITADEL on AWS SSO.
It covers how to:
Prerequisites:
We have to switch between ZITADEL and AWS. If the headings begin with "ZITADEL" switch to the ZITADEL Management Console and if the headings start with "AWS" please switch to the AWS GUI.
As you have activated SSO you still have the possibility to use AWS itself to manage the users, but you can also use a Microsoft AD or an external IDP.
Described here how you can connect to ZITADEL as a SAML2 IDP.
Chose the External identity provider:
Download the metadata file, to provide ZITADEL with all the information it needs, and save the AWS SSO Sign-in URL, which you use to log in afterward.
Fill out the fields as follows, to provide AWS with all the information it needs:
To connect to another environment, change the domains, for example if you would use ZITADEL under the url " https://example.com" you would have the URLs "https://example.com/saml/v2/SSO" and "https://example.com/saml/v2/metadata".
Download the ZITADEL-used certificate to sign the responses, so that AWS can validation the signature.
You can download the certificate from following
URL: ${CUSTOM_DOMAIN}/saml/v2/certificate
Then upload the ".crt"-file to AWS and click "next".
Lastly, accept to confirm the change and ZITADEL is used as the external identity provider for AWS SSO to provide connectivity to your AWS Accounts.
As for how the SSO users are then connected to the AWS accounts, you can find more information in the AWS documentation, for example here.
The metadata used in this part is from "Change to external identity provider ZITADEL" step 2.
In your existing project:
Everything on the side of ZITADEL is done if the application is correctly created.
The result, you can now log in to you AWS account through your ZITADEL-login with the AWS SSO Sign-in URL, which you should have saved in "Change to external identity provider ZITADEL" step 2.