![]() We use this file later to create the IdP. On the Configuration tab, choose Download to download the AWS SSO SAML metadata file.For Application SAML audience, enter urn:amazon:webservices:redshift.In the Application metadata section, choose the option to manually enter the metadata values.For Display name, enter an appropriate name for the SAML application (for this post, because we create two applications, we first enter Redshift-SAML-BI-User). ![]() Choose Add a custom SAML 2.0 application.On the AWS SSO console, choose Applications in the navigation pane.In this step, you create two custom SAML applications in AWS SSO. If AWS SSO isn’t configured in your account, follow the steps in Getting Started. The following screenshot shows our AWS SSO identity source mapping.Īs mentioned in the prerequisites section, you need to enable AWS SSO in your account, and map it with a supported identity source. The following screenshots show our AD groups and user mappings. We create two SAML applications in AWS SSO to map these two groups with their respective users and then connect to Amazon Redshift using SQL Workbench/J client via AWS SSO using their Microsoft AD user credentials.Īs a prerequisite step, we have already set up an AWS Managed Microsoft AD directory with sample directory groups and user mappings, and attached it to AWS SSO as the identity source. In this example use case, we use AWS SSO integrated with AWS Managed Microsoft AD as the identity source to connect to an Amazon Redshift cluster as users from two different AD groups: BI users and analysts. We use the SQL Workbench/J client in this post. The Amazon Redshift JDBC driver (version 2.0+) downloaded and installed on your workstation.An AWS account with AWS SSO enabled, and linked to your identity source directory.You need the following prerequisites to set up this solution: Configure the JDBC/ODBC client to authenticate with your AWS SSO SAML application and obtain federated IAM credentials to access the Amazon Redshift cluster.Set up the Amazon Redshift cluster and database groups that correspond to your AWS SSO directory groups. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |