Edit identity provider configuration - Amazon Transfer Family
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Edit identity provider configuration

You can change your server's identity provider type from any type to any other type. The available identity provider types are:

  • Service managed – Store user credentials within the service

  • Amazon Directory Service – Use Amazon Managed Microsoft AD or Amazon Directory Service for Entra ID Domain Services

  • Custom – Use Lambda function or Amazon API Gateway to integrate with your existing identity provider

When changing identity provider types, you need to provide specific information depending on the transition you're making. The following sections describe the required information for each type of change.

Important

Considerations when changing identity providers:

  • User migration – When changing identity provider types, existing user configurations are not automatically migrated. You'll need to set up users in the new identity provider system.

  • Testing – Test the new identity provider configuration thoroughly before making the change in production environments.

  • Permissions – Ensure that the new identity provider has the necessary IAM permissions and roles configured before making the change.

Changing to service-managed identity provider

When changing from any other identity provider type to service-managed, you need to:

  • Select Service managed as the identity provider type

  • Create new users directly in Amazon Transfer Family after the change is complete, as existing user configurations from other identity providers won't be transferred

Example: If you're changing from a custom identity provider to service-managed, you'll need to recreate all user accounts and their associated permissions within the Amazon Transfer Family service.

Changing to Amazon Directory Service

When changing from any other identity provider type to Amazon Directory Service, you need to provide:

  • Directory – Select an existing Amazon Managed Microsoft AD or Amazon Directory Service for Entra ID Domain Services directory

  • Access – Choose whether to restrict access to a specific group or allow access to all users in the directory

  • Access role – An IAM role that allows Amazon Transfer Family to access your directory

Example: If you're changing from service-managed to Amazon Directory Service, you would select your existing d-1234567890 directory, choose to restrict access to the TransferUsers group, and specify the TransferDirectoryAccessRole IAM role.

Changing to custom identity provider

When changing from any other identity provider type to a custom identity provider, you need to choose between Lambda function or Amazon API Gateway and provide the required configuration:

Using Lambda function

For Lambda function integration, provide:

  • Function – Select an existing Lambda function that handles authentication

  • Authentication method (for SFTP protocol) – Choose password, public key, or both

Example: If you're changing from Amazon Directory Service to a custom Lambda identity provider, you would select your TransferCustomAuth function and choose Password as the authentication method.

For a Lambda identity provider, you can change the underlying Lambda function.

Using Amazon API Gateway

For Amazon API Gateway integration, provide:

  • API Gateway URL – The invoke URL of your API Gateway endpoint

  • Invocation role – An IAM role that allows Amazon Transfer Family to invoke your API Gateway

  • Authentication method (for SFTP protocol) – Choose password, public key, or both

Example: If you're changing from service-managed to API Gateway, you would provide the URL https://abcdef123.execute-api.us-east-1.amazonaws.com/prod, specify the TransferApiGatewayInvocationRole IAM role, and choose Public key as the authentication method.

For an API Gateway identity provider, you can update the Gateway URL or the invocation role, or both.

Changing from Amazon API Gateway to Lambda function

A common transition is changing from Amazon API Gateway to Lambda function for custom identity provider integration. This change allows you to simplify your architecture while maintaining the same authentication logic.

Key considerations for this transition:

  • Same function, different permissions – You can use the same Lambda function for both API Gateway and direct Lambda integration, but the resource policy must be updated.

  • Resource policy requirements – When changing to direct Lambda integration, the function's resource policy must grant transfer.amazonaws.com permission to invoke the function, in addition to apigateway.amazonaws.com.

To make this change
  1. Update your Lambda function's resource policy to allow transfer.amazonaws.com to invoke the function.

  2. In the Amazon Transfer Family console, change the identity provider from API Gateway to Lambda function.

  3. Select your existing Lambda function.

  4. Test the configuration to ensure authentication works correctly.

Example resource policy for direct Lambda integration:

{ "Version":"2012-10-17", "Statement": [{ "Effect": "Allow", "Principal": { "Service": [ "transfer.amazonaws.com", "apigateway.amazonaws.com" ] }, "Action": "lambda:InvokeFunction", "Resource": "arn:aws:lambda:us-east-1:123456789012:function:function-name" }] }

User preservation during identity provider transitions

When changing between identity provider types, existing user configurations are preserved in specific scenarios to enable efficient rollback in case of issues:

  • Service-managed to custom identity provider and back – If you change from service-managed to a custom identity provider and then back to service-managed, all users are preserved in their last known configuration.

  • Amazon Directory Service to custom identity provider and back – If you change from Amazon Directory Service to a custom identity provider and then back to Amazon Directory Service, all definitions for Delegated Access groups are retained in their last known configuration.

This preservation behavior allows you to safely test custom identity provider configurations and roll back to your previous setup without losing user access configurations.

Important considerations when changing identity providers

  • User migration – When changing identity provider types, existing user configurations are not automatically migrated. You'll need to set up users in the new identity provider system.

  • Testing – Test the new identity provider configuration thoroughly before making the change in production environments.

  • Permissions – Ensure that the new identity provider has the necessary IAM permissions and roles configured before making the change.