Integrate AWS SSO with Jumpserver
Integrate AWS SSO in Ezeelogin SSH Gateway
1. Login to AWS console > select AWS Single Sign-On and click on Applications
2. Click on Add Application
3. Click on Add a custom SAML 2.0 application
4. Configure Custom SAML 2.0 application. Add Display name & Description
5. Add Application properties & Application metadata
A. Fill the Application start URL . You can find it from Ezeelogin GUI > Settings > SAML> Entity ID
B. Fill the Application start URL & Click on If you don't have a metadata file, you can manually type your metadata values.
Fill the Application ACS URL & Application SAML audience
Application ACS URL - Assertion Consumer Service URL ( you can find it from Ezeelogin GUI > Settings > SAML> Assertion Consumer Service URL)
Application SAML audience - Entity ID ( you can find it from Ezeelogin GUI > Settings > SAML> Entity ID )
Click on save changes.
6. Click on Attribute Mappings and Add attributes as follows.
Add attributes
A. Add ${user:email} and select emailAddress Format
B. Click on Add new attribute mapping and add email to first column, ${user:email} to next column & select unspecified Format and save.
7. Add and assign users to access our application.
A. Add user : Click on Add user in Users tab in aws sso console
B. Add Username, Password, Email address, First name, Last name & Display name and Click Next. Assign to a usergroup and Save.
You need to add different email address for each users. By default ezeelogin uses email address for creating users. You should an email address for superadministrator in ezeelogin(It will be empty by default )
If you want to add an existing user in ezeelogin into SSO, Add the user with exact username, email address as follows. (Ezeelogin will verify with the email address of the users by default)
C. Click on Assigned users tab and click on Assign users button to assign users to this application.
8. Add SAML Identity Provider (IdP) Settings on Ezeelogin.
Copy the AWS SSO SAML metadata url and paste it to Metadata URL on Ezeelogin GUI > Settings > SAML Metadata URL and click on the fetch button ,It will autofill the SAMLsettings and Save it.
Paste the Metadata URL on Ezeelogin GUI > Settings > SAML Metadata URL and click on the Fetch button & save it.
10. Enable Autocreate user from Ezeelogin GUI > Settings > General > Security > Enable Auto create user
You can now login to ezeelogin GUI with ezeelogin URL and it will redirect to aws sso page. You must log in with aws sso credentails and it will redirect and log in to ezeelogin gui after successful authentication.
11. Finally, logged into the Ezeelogin GUI using SAML Authentication.
12. After logging into the GUI, you need to reset the password and security code of the saml user under Account>Password in order to ssh to the Ezsh shell
13.After resetting the password and security code you can ssh to the Ezsh shell (using Terminal or putty)with the saml username as shown below in the screenshot
14. If you are SSH ing with 2FA enabled using Putty or Terminal it would prompt you to enter the 2FA codes, The 2FA step can be disabled for SAML Authentication under Settings > Two Factor Authentication> Skip Two Factor Authentication for SAML.The user will be able to ssh without being prompted for the 2FA codes only if the user is logged into the webpanel , otherwise if the user is not logged into the webpanel it would prompt for the 2FA codes.
15. It is recommended to use the webssh shell for the SAML authentication. The webssh shell is more convenient as the user would not have to open an ssh client such as putty/terminal and enter the username/password and 2FA codes. Using the webssh, the user can ssh from the webpanel itself and 2fa will not be prompted if you have enabled the Skip Two factor Authentication for SAML.
Note: SAML is an authentication mechanism for web applications. It's based on web protocols and it cannot be used for user authentication over SSH.
Saml authentication is not supported for slave if the URL is IP-based.If you want to authenticate slave using saml you have to use domain name