AWS Partner Network (APN) Blog
Category: AWS IAM Identity Center
How to Enhance Your Zero-Trust Security Journey on AWS with Cisco Duo
Cisco Duo integrates with AWS to establish and maintain zero-trust security. It helps to eliminate surface area through strict access policies, evaluate risk signals to require step-up authentication, and establish device trust through posture checks and compliance enforcement. Learn now to configure Duo’s policies that enable risk-based authentication, deploy Duo Desktop for device trust, and integrate Duo with AWS via SAML and OpenID Connect to protect AWS services and applications.
Just-in-Time Least Privileged Access to AWS Administrative Roles with Okta and AWS Identity Center
AWS provides a rich set of tools and capabilities for managing access to cloud architectures including AWS IAM Identity Center, which makes it easy to manage access across your entire organization. Learn how AWS customers can leverage Okta Access Requests and AWS IAM Identity Center to provide just-in-time access to cloud resources. Granting just-in-time access to developers for a limited time based on approval is an effective way to limit the active time frame for assignments to your AWS resources.
Securing AWS Accounts with Azure Active Directory Federation
With AWS Identity and Access Management (IAM), AWS provides a central way to manage user identities and permissions. However, creating and managing the lifecycle of IAM users in AWS can be time-consuming. This post explores how to authenticate users against Azure AD for access to one or multiple AWS accounts using SAML federation. Additionally, it includes a walkthrough on how to setup the federation across Azure AD and multiple AWS accounts.
Federated Access to AWS Single Sign-On with CyberArk Workforce Identity
AWS Single Sign-On (AWS SSO) is where you create or connect your workforce identities in AWS once and manage access centrally across your AWS Organization. Learn about the new integration with CyberArk Workforce Identity to provide simplified access management and provisioning to AWS. With this integration, you can have a single point of truth for all enterprise identities and enforce consistent management of users, groups, permissions, and access policies while reducing redundancies and errors.
Simplifying Sign-In for AWS Managed Services with OneLogin, AWS Single Sign-On, and AWS IAM
OneLogin, an AWS Security Competency Partner, provides an identity platform for secure, scalable, and smart experiences that connects people to technology. Learn about all of the integrations available between OneLogin and AWS. Through these integrations, OneLogin enables you to seamlessly authenticate into AWS managed services across various domains, including analytics, compute, serverless, security, management and governance, and more.
How to Integrate AWS Single Sign-On with MongoDB Atlas
MongoDB Atlas is the global cloud database service for modern applications, and in this post learn how to configure MongoDB Atlas to authenticate using AWS Single Sign-On (AWS SSO). Instead of having to sign in separately to MongoDB Atlas Control Plane, with this configuration enabled users can access the MongoDB Atlas user interface with their corporate credentials using AWS SSO. This delivers a better user experience without the need for managing separate sets of credentials.
Enabling Single Sign-On Between OneLogin and AWS
AWS Single Sign-On allows customers to efficiently manage user identities at scale by establishing a single identity and access strategy across their own applications, third-party applications), and AWS environments. Learn about the integration of AWS SSO with OneLogin, an authentication and role-based user provisioning engine that enables organizations to implement least-privilege access controls and eliminate manual user management workflows for all AWS users and accounts.
AWS Single Sign-On Service Integration Guide for CloudHealth
AWS Single Sign-On makes it easy for end users to sign into the AWS Console and access applications with a single set of credentials. Until now, customers had to sign in to the AWS Console to work with AWS resources, and they had to sign in separately to CloudHealth to analyze and manage their computing environment or the resources in their environment. Learn how to connect CloudHealth with AWS SSO using SAML 2.0, so your users have a single experience to access both the AWS Console and CloudHealth.
AWS Single Sign-On Integration Guide for Dynatrace
End users can now configure AWS Single Sign-On (AWS SSO) to access Dynatrace with a single sign-on experience using the same credentials they use with their Amazon Web Services (AWS) account. AWS Single Sign-On provides administrators a simple way to assign users and groups access to AWS accounts, roles, and SAML-based applications. This eliminates the need for users to log in to Dynatrace separately.
Enabling AWS Single Sign-On (SSO) Service Integration with Databricks Control Plane
AWS Single Sign-On makes it easy to centrally manage SSO access to multiple AWS accounts and business applications. You can use AWS SSO to create and manage users centrally and grant access to AWS accounts and business applications, such as Databricks. Instead of having to sign in separately to Databricks Control Plane and other business applications, with this configuration enabled users can access Databricks with their corporate credentials using AWS SSO.