How to add Okta as a SAML Identity Provider in AWS Cognito?

Поделиться
HTML-код
  • Опубликовано: 8 сен 2024
  • This video explains the steps to add Okta as a SAML Identity Provider in AWS Cognito. It also simulates a multi-tenant app.
    To add Okta as a OIDC Identity Provider in AWS Cognito, please follow this video • How to add Okta as a O...
    Refer this blog / how-to-add-okta-as-sam... for more details
    #identity #iam #security #sso #aws #amazonwebservices #cognito #saml #awscognito #amazoncognito

Комментарии • 41

  • @securityinaction1018
    @securityinaction1018  2 года назад +1

    Please subscribe to this channel for regular updates ruclips.net/channel/UCEEayyyCrJO94FYlzF0NLTg
    Thank You for the support.

  • @ianlamb1910
    @ianlamb1910 Год назад

    You absolute hero, I had an issue with my mappings that the AWS documentation had incorrectly told me to follow. Your advice has fixed this for me, brilliant video well done and thank you!

  • @ciaranmcgauran8367
    @ciaranmcgauran8367 4 месяца назад

    Thank you for this really clear walk through. Much appreciated.

    • @securityinaction1018
      @securityinaction1018  4 месяца назад

      Glad it was helpful!
      Please like, subscribe & share!! Thanks in advance.

  • @user-jh3sq2pp2m
    @user-jh3sq2pp2m Год назад +2

    How do I buy you a drink man? Your videos are great! Right on!

  • @nehachaurasia5958
    @nehachaurasia5958 9 месяцев назад

    Very helpful and Informative.

  • @2mitaly
    @2mitaly 10 месяцев назад

    Great tutorial! Thanks a lot!

  • @user-og7ox7lv6s
    @user-og7ox7lv6s Год назад +1

    very useful thanks

  • @daraptoor
    @daraptoor Год назад +1

    You save my day :)

  • @AleksandarT10
    @AleksandarT10 Год назад +1

    I have an use case where we want to use Cognito with OKTA using SAML.
    Since our application needs to have ROLES/SCOPES where we control who can access what, is it possible to configure this in Okta (something like roles/permissions/custom attributes?) and they are passed to Cognito and be as part of the token?
    Great video! Keep up the good work!

    • @securityinaction1018
      @securityinaction1018  Год назад

      I am sure there should be some way to pass the Okta roles in a SAML attribute and then map that to a custom Cognito userpool attribute. This custom attribute can be added in the Cognito's ID token.

    • @AleksandarT10
      @AleksandarT10 Год назад

      @@securityinaction1018 I managed to do that just now, added "groups" attribute and included all the groups the user belongs to, and after that i am mapping it to custom Cognito User Pool attribute and that appears in the ID token. Is it possible for somehow to appear in the access token? Because i will have to use ID tokens to do my Authentication/Authorization, which "apparently" is not a good practice based on some people on the internet

    • @securityinaction1018
      @securityinaction1018  Год назад +1

      I don't think that is possible at this point of time unless those groups are present in Cognito and users are added to those cognito groups.

    • @chandanb8182
      @chandanb8182 11 месяцев назад

      @@AleksandarT10 Can you provide me the steps on how we can show okta groups in ID token. I'm not able to see it in the ID token. I have created a group in okta and assigned the user as well. In cognito I created the custom user attribute custom:appgroups and mapped it to okta group name admingroup. But still the group is not showing up

  • @chandanb8182
    @chandanb8182 11 месяцев назад

    Hi, Can you make a video with Authorization code grant flow instead of implicit grant flow and how we can use it in our application

    • @securityinaction1018
      @securityinaction1018  11 месяцев назад

      Please refer this video which talks about authorization code grant flow using Okta ruclips.net/video/q56Io39l3qg/видео.html

  • @user-ef1oj8xu6n
    @user-ef1oj8xu6n Год назад

    The video is excellent. It worked for authentication but the User was not got created automatically in the user pool. Can you please guide?

    • @securityinaction1018
      @securityinaction1018  Год назад

      Please check the users tab in the Cognito user pool. If it doesn't show up, refresh the page.

    • @user-ef1oj8xu6n
      @user-ef1oj8xu6n Год назад

      I refreshed as Users have not got created, reaching out to you for your guidance. One more point, it created a group with UserPool Id_Okta Domain name without any user. @@securityinaction1018

    • @securityinaction1018
      @securityinaction1018  Год назад

      That's surprising. Are you getting an ID token ? If so, a user profile should be present. But, I am not sure why it is not showing up even after refreshing. May be you can try opening the console in different browsers or incognito window.

  • @PiyushKumar-js1ww
    @PiyushKumar-js1ww Год назад

    Hi , This is very informative video , could you help me with add keycloak as SAML Identity Provider in aws cognito if you have any reference or setup guide.

    • @securityinaction1018
      @securityinaction1018  Год назад

      I will check keycloak and publish a video in future

    • @securityinaction1018
      @securityinaction1018  Год назад

      I added a new video on how to configure Keycloak as SAML IdP in Cognito. ruclips.net/video/EFT-3TGLhZw/видео.html

  • @user-or2wy9uh4z
    @user-or2wy9uh4z Год назад

    After redirecting with JWT token How can I decrypt the token in Javascript. Which npm package should be use and for decryption from where I can get the keys??

    • @securityinaction1018
      @securityinaction1018  Год назад +1

      Hi Dipak, refer this documentation for more details docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-tokens-verifying-a-jwt.html#amazon-cognito-user-pools-using-tokens-aws-jwt-verify.
      It has all the details that you asked.

    • @user-or2wy9uh4z
      @user-or2wy9uh4z Год назад

      ​@@securityinaction1018 As per video we don't set federation by clicking seperate link 'Federated Identities' in aws cognito service. Now I'm using 'aws-amplify' package where 'federatedSignIn' method required identity_id e.g. eu-north-1:8e2f0d8e-3014-41da-977b-7c7e28fba44a
      . How can I provide this ID by creating new federation it shows error 'unknown federation id'

    • @securityinaction1018
      @securityinaction1018  Год назад

      I have not used amplify library. If you can point out to the exact documentation, I can take a look and let you know. Also, can you explain the requirement? Do you want to bypass the Cognito login page and redirect to the external IdP login page?

  • @chandanb8182
    @chandanb8182 11 месяцев назад

    how can we generate access token with okta or cognito groups in the access token

    • @securityinaction1018
      @securityinaction1018  11 месяцев назад

      Cognito groups are already available in Access Token in "cognito:groups" claim. Refer this documentation for more details docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-the-access-token.html

    • @chandanb8182
      @chandanb8182 11 месяцев назад

      @@securityinaction1018 I need to get the groups from okta, how to get the groups from okta within the access and ID token.

    • @securityinaction1018
      @securityinaction1018  11 месяцев назад

      Refer support.okta.com/help/s/article/How-to-pass-a-user-s-group-membership-in-a-SAML-Assertion-from-Okta?language=en_US. I have not tried this.
      You can map the Okta SAML attribute that has group details to a custom attribute in Cognito user profile. This custom attribute will get added as a claim in the ID token, but not access token.

  • @user-or2wy9uh4z
    @user-or2wy9uh4z Год назад

    Can we get access for okta and cognito pool both users by same email & password form??

    • @securityinaction1018
      @securityinaction1018  Год назад +1

      If I understand the question correctly, you want to authenticate both okta and cognito pool users using the same login form. If so, that is not possible because Okta profiles are stored within Okta user data store and similarly, Cognito users in Cognito's user data store. Federation is the best way to handle this.