0 votes
in AWS Access Management by
How do I enable web identity federation with accounts from public IdPs?

1 Answer

0 votes
by

For best results, use Amazon Cognito as your identity broker for almost all web identity federation scenarios. Amazon Cognito is easy to use and provides additional capabilities such as anonymous (unauthenticated) access, and synchronizing user data across devices and providers. However, if you have already created an app that uses web identity federation by manually calling the AssumeRoleWithWebIdentity API, you can continue to use it and your apps will still work.

Here are the basic steps to enable identify federation using one of the supported web IdPs:

  1. Sign up as a developer with the IdP and configure your app with the IdP, who gives you a unique ID for your app.
  2. If you use an IdP that is compatible with OIDC, create an identity provider entity for it in IAM.
  3. In AWS, create one or more IAM roles.
  4. In your application, authenticate your users with the public IdP.
  5. In your app, make an unsigned call to the AssumeRoleWithWebidentity API to request temporary security credentials.
  6. Using the temporary security credentials you get in the AssumeRoleWithWebidentity response, your app makes signed requests to AWS APIs.
  7. Your app caches the temporary security credentials so that you do not have to get new ones each time the app needs to make a request to AWS.
  8. For more detailed steps, see Using Web Identity Federation APIs for Mobile Apps.

 

Related questions

0 votes
asked Sep 11, 2021 in AWS Access Management by SakshiSharma
0 votes
asked Sep 13, 2021 in AWS Access Management by rajeshsharma
...