Тёмный

How to add Okta as a SAML Identity Provider in AWS Cognito? 

Security in Action 101
Подписаться 2,3 тыс.
Просмотров 7 тыс.
50% 1

Опубликовано:

 

20 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 41   
@securityinaction1018
@securityinaction1018 2 года назад
Please subscribe to this channel for regular updates ru-vid.com/show-UCEEayyyCrJO94FYlzF0NLTg Thank You for the support.
@ianlamb1910
@ianlamb1910 Год назад
You absolute hero, I had an issue with my mappings that the AWS documentation had incorrectly told me to follow. Your advice has fixed this for me, brilliant video well done and thank you!
@securityinaction1018
@securityinaction1018 Год назад
Glad it helped!
@ciaranmcgauran8367
@ciaranmcgauran8367 5 месяцев назад
Thank you for this really clear walk through. Much appreciated.
@securityinaction1018
@securityinaction1018 5 месяцев назад
Glad it was helpful! Please like, subscribe & share!! Thanks in advance.
@JohnDoe-z3y
@JohnDoe-z3y Год назад
How do I buy you a drink man? Your videos are great! Right on!
@securityinaction1018
@securityinaction1018 Год назад
Any time! 🙂
@nehachaurasia5958
@nehachaurasia5958 11 месяцев назад
Very helpful and Informative.
@securityinaction1018
@securityinaction1018 11 месяцев назад
Glad it was helpful!
@AleksandarT10
@AleksandarT10 2 года назад
I have an use case where we want to use Cognito with OKTA using SAML. Since our application needs to have ROLES/SCOPES where we control who can access what, is it possible to configure this in Okta (something like roles/permissions/custom attributes?) and they are passed to Cognito and be as part of the token? Great video! Keep up the good work!
@securityinaction1018
@securityinaction1018 2 года назад
I am sure there should be some way to pass the Okta roles in a SAML attribute and then map that to a custom Cognito userpool attribute. This custom attribute can be added in the Cognito's ID token.
@AleksandarT10
@AleksandarT10 2 года назад
@@securityinaction1018 I managed to do that just now, added "groups" attribute and included all the groups the user belongs to, and after that i am mapping it to custom Cognito User Pool attribute and that appears in the ID token. Is it possible for somehow to appear in the access token? Because i will have to use ID tokens to do my Authentication/Authorization, which "apparently" is not a good practice based on some people on the internet
@securityinaction1018
@securityinaction1018 2 года назад
I don't think that is possible at this point of time unless those groups are present in Cognito and users are added to those cognito groups.
@chandanb8182
@chandanb8182 Год назад
@@AleksandarT10 Can you provide me the steps on how we can show okta groups in ID token. I'm not able to see it in the ID token. I have created a group in okta and assigned the user as well. In cognito I created the custom user attribute custom:appgroups and mapped it to okta group name admingroup. But still the group is not showing up
@2mitaly
@2mitaly 11 месяцев назад
Great tutorial! Thanks a lot!
@securityinaction1018
@securityinaction1018 11 месяцев назад
Glad it was helpful!
@DhirenSahu-v6y
@DhirenSahu-v6y Год назад
The video is excellent. It worked for authentication but the User was not got created automatically in the user pool. Can you please guide?
@securityinaction1018
@securityinaction1018 Год назад
Please check the users tab in the Cognito user pool. If it doesn't show up, refresh the page.
@DhirenSahu-v6y
@DhirenSahu-v6y Год назад
I refreshed as Users have not got created, reaching out to you for your guidance. One more point, it created a group with UserPool Id_Okta Domain name without any user. @@securityinaction1018
@securityinaction1018
@securityinaction1018 Год назад
That's surprising. Are you getting an ID token ? If so, a user profile should be present. But, I am not sure why it is not showing up even after refreshing. May be you can try opening the console in different browsers or incognito window.
@RahulKashyap-f7r
@RahulKashyap-f7r Год назад
very useful thanks
@securityinaction1018
@securityinaction1018 Год назад
Glad it was helpful!
@daraptoor
@daraptoor Год назад
You save my day :)
@securityinaction1018
@securityinaction1018 Год назад
Glad it helped :)
@chandanb8182
@chandanb8182 Год назад
Hi, Can you make a video with Authorization code grant flow instead of implicit grant flow and how we can use it in our application
@securityinaction1018
@securityinaction1018 Год назад
Please refer this video which talks about authorization code grant flow using Okta ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-q56Io39l3qg.html
@dipakchaudhari-f6j
@dipakchaudhari-f6j Год назад
After redirecting with JWT token How can I decrypt the token in Javascript. Which npm package should be use and for decryption from where I can get the keys??
@securityinaction1018
@securityinaction1018 Год назад
Hi Dipak, refer this documentation for more details docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-tokens-verifying-a-jwt.html#amazon-cognito-user-pools-using-tokens-aws-jwt-verify. It has all the details that you asked.
@dipakchaudhari-f6j
@dipakchaudhari-f6j Год назад
​@@securityinaction1018 As per video we don't set federation by clicking seperate link 'Federated Identities' in aws cognito service. Now I'm using 'aws-amplify' package where 'federatedSignIn' method required identity_id e.g. eu-north-1:8e2f0d8e-3014-41da-977b-7c7e28fba44a . How can I provide this ID by creating new federation it shows error 'unknown federation id'
@securityinaction1018
@securityinaction1018 Год назад
I have not used amplify library. If you can point out to the exact documentation, I can take a look and let you know. Also, can you explain the requirement? Do you want to bypass the Cognito login page and redirect to the external IdP login page?
@PiyushKumar-js1ww
@PiyushKumar-js1ww Год назад
Hi , This is very informative video , could you help me with add keycloak as SAML Identity Provider in aws cognito if you have any reference or setup guide.
@securityinaction1018
@securityinaction1018 Год назад
I will check keycloak and publish a video in future
@securityinaction1018
@securityinaction1018 Год назад
I added a new video on how to configure Keycloak as SAML IdP in Cognito. ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-EFT-3TGLhZw.html
@dipakchaudhari-f6j
@dipakchaudhari-f6j Год назад
Can we get access for okta and cognito pool both users by same email & password form??
@securityinaction1018
@securityinaction1018 Год назад
If I understand the question correctly, you want to authenticate both okta and cognito pool users using the same login form. If so, that is not possible because Okta profiles are stored within Okta user data store and similarly, Cognito users in Cognito's user data store. Federation is the best way to handle this.
@chandanb8182
@chandanb8182 Год назад
how can we generate access token with okta or cognito groups in the access token
@securityinaction1018
@securityinaction1018 Год назад
Cognito groups are already available in Access Token in "cognito:groups" claim. Refer this documentation for more details docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-the-access-token.html
@chandanb8182
@chandanb8182 Год назад
@@securityinaction1018 I need to get the groups from okta, how to get the groups from okta within the access and ID token.
@securityinaction1018
@securityinaction1018 Год назад
Refer support.okta.com/help/s/article/How-to-pass-a-user-s-group-membership-in-a-SAML-Assertion-from-Okta?language=en_US. I have not tried this. You can map the Okta SAML attribute that has group details to a custom attribute in Cognito user profile. This custom attribute will get added as a claim in the ID token, but not access token.
Далее
NCT DOJAEJUNG 엔시티 도재정 'Perfume' MV
3:07
Elm Media Live Stream
17:51
Просмотров 25
57. Cognito User Pools vs. Identity Pools
15:32
Просмотров 11 тыс.
What Is Single Sign-on (SSO)? How It Works
4:54
Просмотров 620 тыс.
What is SAML? A Comprehensive Guide with Examples
9:52
NCT DOJAEJUNG 엔시티 도재정 'Perfume' MV
3:07