Initiating sign-on from the identity provider (IdP)
Applies to: Enterprise Edition and Standard Edition |
Intended audience: System administrators |
Note
IAM identity federation doesn't support syncing identity provider groups with Amazon Quick Suite.
In this scenario, your users initiate the sign-on process from the identity provider's portal. After the users are authenticated, they sign in to Amazon Quick Suite. After Quick Suite checks that they are authorized, your users can access Quick Suite.
Beginning with a user signing into the IdP, authentication flows through these steps:
-
The user browses to
https://applications.example.com
and signs on to the IdP. At this point, the user isn't signed in to the service provider. -
The federation service and the IdP authenticate the user:
-
The federation service requests authentication from the organization's identity store.
-
The identity store authenticates the user and returns the authentication response to the federation service.
-
When authentication is successful, the federation service posts the SAML assertion to the user’s browser.
-
-
The user opens Amazon Quick Suite:
-
The user's browser posts the SAML assertion to the Amazon Sign-In SAML endpoint (
https://signin.aws.amazon.com/saml
). -
Amazon Sign-In receives the SAML request, processes the request, authenticates the user, and forwards the authentication token to the Amazon Quick Suite service.
-
-
Amazon Quick Suite accepts the authentication token from Amazon and presents Amazon Quick Suite to the user.
From the user's perspective, the process happens transparently. The user starts at your organization's internal portal and lands at an Amazon Quick Suite application portal, without ever having to supply any Amazon credentials.
In the following diagram, you can find an authentication flow between Amazon Quick Suite and
a third-party identity provider (IdP). In this example, the administrator has set up a
sign-in page to access Amazon Quick Suite, called applications.example.com
. When
a user signs in, the sign-in page posts a request to a federation service that complies
with SAML 2.0. The end user initiates authentication from the sign-on page of the
IdP.

For information from some common providers, see the following third-party documentation:
-
Okta – Planning a SAML deployment
-
Ping – Amazon integrations
Use the following topics to understand using an existing federation with Amazon:
-
Identity federation in Amazon
on the Amazon website -
Providing access to externally authenticated users (identity federation) in the IAM User Guide
-
Enabling SAML 2.0 federated users to access the Amazon Management Console in the IAM User Guide