Okta
You can use Okta as an identity provider (IdP) to access your Amazon Redshift cluster. This tutorial shows you how you can use Okta as an identity provider (IdP) to access your Amazon Redshift cluster.
Step 1: Set up Okta and your AWS account to trust each other
The following procedure describes how to set up a trust relationship.
To set up Okta and your AWS account to trust each other
-
Create or use an existing Amazon Redshift cluster for your Okta users to connect to. To configure the connection, certain properties of this cluster are needed, such as the cluster identifier. For more information, see Creating a Cluster.
-
Add Amazon Redshift as a new application on the Okta portal. For detailed steps, see the Okta documentation
. -
Choose Add Application.
-
Under Add Application, choose Create New App.
-
On the Create a New Add Application Integration page, for Platform, choose Web.
-
For Sign on method, choose SAML v2.0.
-
On the General Settings page, for App name, enter
. This is the name of your application.your-redshift-saml-sso-name
-
On the SAML Settings page, for Single sign on URL, enter
. This is the local host and port that the SAML assertion redirects to, for exampleyour-redshift-local-host-url
http://localhost:7890/redshift/
.
-
-
Use the Single sign on URL value as the Recipient URL and Destination URL.
-
For Signing, choose Sign Assertion.
-
For Audience URI (SP Entity ID), enter
urn:amazon:webservices
for the claims, as shown in the following table. -
In the Advanced Settings section, for SAML Issuer ID, enter
, which you can find in the View Setup Instructions section.your-Identity-Provider-Issuer-ID
-
In the Attribute Statements section, create the claims as shown in the following table.
Claim name Value https://aws.amazon.com/SAML/Attributes/Role
arn:aws:iam::
123456789012
:role/Okta
,arn:aws:iam::123456789012
:saml-provider/Okta
https://aws.amazon.com/SAML/Attributes/RoleSessionName
user.email
https://redshift.amazon.com/SAML/Attributes/AutoCreate
"true"
https://redshift.amazon.com/SAML/Attributes/DbUser
user.email
-
In the App Embed Link section, find the URL that you can use as the login URL for the Browser SAML plugin.
-
Create an IAM SAML identity provider on the IAM console. The metadata document that you provide is the federation metadata XML file that you saved when you set up Okta. For detailed steps, see Creating and Managing an IAM Identity Provider (Console) in the IAM User Guide.
-
Create an IAM role for SAML 2.0 federation on the IAM console. For detailed steps, see Creating a Role for SAML in the IAM User Guide.
-
Create an IAM policy that you can attach to the IAM role that you created for SAML 2.0 federation on the IAM console. For detailed steps, see Creating IAM Policies (Console) in the IAM User Guide. For an Azure AD example, see Setting up JDBC or ODBC single sign-on authentication.