Ping Identity
You can use Ping Identity as an identity provider (IdP) to access your Amazon Redshift cluster. This tutorial shows you how you can use Ping Identity as an identity provider (IdP) to access your Amazon Redshift cluster.
Step 1: Set up Ping Identity and your AWS account to trust each other
The following procedure describes how to set up a trust relationship using the PingOne portal.
To set up Ping Identity and your AWS account to trust each other
-
Create or use an existing Amazon Redshift cluster for your Ping Identity users to connect to. To configure the connection, certain properties of this cluster are needed, such as the cluster identifier. For more information, see Creating a Cluster.
-
Add Amazon Redshift as a new SAML application on the PingOne portal. For detailed steps, see the Ping Identity documentation
. -
Go to My Applications.
-
Under Add Application, choose New SAML Application.
-
For Application Name, enter
Amazon Redshift
. -
For Protocol Version, choose SAML v2.0.
-
For Category, choose
.your-application-category
-
For Assertion Consumer Service (ACS), type
. This is the local host and port that the SAML assertion redirects to.your-redshift-local-host-url
-
For Entity ID, enter
urn:amazon:webservices
. -
For Signing, choose Sign Assertion.
-
In the SSO Attribute Mapping section, create the claims as shown in the following table.
Application attribute Identity bridge attribute of literal value https://aws.amazon.com/SAML/Attributes/Role
arn:aws:iam::
123456789012
:role/Ping
,arn:aws:iam::123456789012
:saml-provider/PingProvider
https://aws.amazon.com/SAML/Attributes/RoleSessionName
email
https://redshift.amazon.com/SAML/Attributes/AutoCreate
"true"
https://redshift.amazon.com/SAML/Attributes/DbUser
email
https://redshift.amazon.com/SAML/Attributes/DbGroups
The groups in the “DbGroups” attributes contain the @directory prefix. To remove this, in Identity bridge, enter memberOf. In Function, choose ExtractByRegularExpression. In Expression, enter (.*)[\@](?:.*).
-
-
For Group Access, set up the following group access, if needed:
-
https://aws.amazon.com/SAML/Attributes/Role
-
https://aws.amazon.com/SAML/Attributes/RoleSessionName
-
https://redshift.amazon.com/SAML/Attributes/AutoCreate
-
https://redshift.amazon.com/SAML/Attributes/DbUser
-
-
Review your setup and make changes, if necessary.
-
Use the Initiate Single Sign-On (SSO) URL as the login URL for the Browser SAML plugin.
-
Create an IAM SAML identity provider on the IAM console. The metadata document that you provide is the federation metadata XML file that you saved when you set up Ping Identity. For detailed steps, see Creating and Managing an IAM Identity Provider (Console) in the IAM User Guide.
-
Create an IAM role for SAML 2.0 federation on the IAM console. For detailed steps, see Creating a Role for SAML in the IAM User Guide.
-
Create an IAM policy that you can attach to the IAM role that you created for SAML 2.0 federation on the IAM console. For detailed steps, see Creating IAM Policies (Console) in the IAM User Guide. For an Azure AD example, see Setting up JDBC or ODBC single sign-on authentication.