Skip to Content

Integrate AWS SSO with Jumpserver

Integrate AWS SSO in Ezeelogin SSH  Gateway

1.  Login to AWS console >  select AWS Single Sign-On and click on Applications

 

2. Click on Add Application

 

 

3. Click on Add a custom SAML 2.0 application

 

 

 

4. Configure Custom SAML 2.0 application. Add Display name & Description

 

 

5. Add Application properties & Application metadata 

 

A. Fill the Application start URL .   You can find it from Ezeelogin GUI > Settings > SAML> Entity ID 

 

B. Fill the  Application start URL & Click on If you don't have a metadata file, you can manually type your metadata values.

 

 

Fill the  Application ACS URL &    Application SAML audience

Application ACS URL -  Assertion Consumer Service URL ( you can find it from Ezeelogin GUI > Settings > SAML> Assertion Consumer Service URL)

Application SAML audience -  Entity ID  ( you can find it from Ezeelogin GUI > Settings > SAML> Entity ID  )

 

Click on save changes.

 

6.   Click on Attribute Mappings and Add attributes as follows.

   

 

Add attributes

 

A. Add ${user:email} and select emailAddress Format

B. Click on Add new attribute mapping   and add email to first column, ${user:email} to next column & select unspecified Format and save.

 

7.  Add and assign users to access our application.

 

A.  Add user : Click on Add user in  Users tab in aws sso console

 

 

B.  Add Username, Password, Email address, First name, Last name & Display name and Click Next. Assign to a usergroup and Save. 

You need to add different email address for each users. By default ezeelogin uses email address for creating  users. You should an email address for superadministrator in ezeelogin(It will be empty by default )

If you want to add an existing user in ezeelogin into SSO, Add the user with exact username, email address as follows. (Ezeelogin will verify with the email address of the users by default)

 

 

 

 

C.   Click on Assigned users tab and click on Assign users button to assign users to this application.

 

 

 

 

8.  Add  SAML Identity Provider (IdP) Settings on Ezeelogin.

 

Copy the AWS SSO SAML  metadata url   and paste it  to Metadata URL  on Ezeelogin GUI > Settings > SAML Metadata URL and click on the fetch button ,It will autofill the SAMLsettings  and Save it.

 

 

Paste the Metadata URL  on Ezeelogin GUI > Settings > SAML Metadata URL and click on the  Fetch button & save it.

 

 

9.  Change Web panel Authentication to SAML from Ezeelogin GUI > Settings > General > Web Panel Authentication > SAML
 


 

10. Enable Autocreate user from   Ezeelogin GUI > Settings > General > Security > Enable Auto create user

 

 

 

You can now login to ezeelogin GUI with ezeelogin URL and it will redirect to aws sso page. You must log in with aws sso credentails and it will redirect and log in to ezeelogin gui after successful authentication.

 

11. Finally, logged into the Ezeelogin GUI using SAML Authentication.


12. After logging  into the GUI, you  need to reset the password and security code of the saml user under Account>Password in order to ssh to the Ezsh shell

13. You can log in to Ezeelogin shell via Webssh shell or using any SSH client such as Putty or terminal etc.

WebSSH: Click on the 'Open Web SSH Console' icon to SSH via the browser

WebSSH terminal will open like below. Users can navigate the server group with the Up and Down arrow buttons and enter to login into the server.

 

Native SSH Client: After resetting the password and security code you can SSH to the Ezsh shell (using Terminal or Putty) with the SAML username.


14.  If you are SSH ing with 2FA  enabled  using Putty or Terminal it would prompt you to enter the 2FA codes, The 2FA  step can be disabled for SAML Authentication under Settings > Two Factor Authentication> Skip Two Factor Authentication for SAML.The user will be able to ssh without being prompted for the 2FA codes only if the user is  logged into the webpanel , otherwise if the user is not logged into the webpanel it would prompt for the 2FA codes.

15. It is recommended to use the webssh shell for the SAML authentication. The webssh shell is more convenient as the user would not have to open an ssh client such as putty/terminal and enter the username/password and 2FA codes. Using the webssh, the user can ssh from the webpanel itself and 2fa will not be prompted if you have enabled the Skip Two factor Authentication for SAML.

Note: SAML is an authentication mechanism for web applications. It's based on web protocols and it cannot be used for user authentication over SSH.

 

Saml authentication is not supported for slave if the URL is IP-based.If you want to authenticate  slave using saml you have to use domain name