https://console.aws.amazon.com/cognito/users/
orbit-{YOUR_ENV_NAME}
)General settings
, get the Pool Id of the User Pool and save it for laterGeneral settings
> Attributes
Add custom attribute
and then save it.App integration
> Domain name
If you already have a KeyCloak implementation, sign in and skip this topic.
REALM
you’d like to use, or create a new oneClients
-> Create
upload the AWS SAML Metadata Fileurn:amazon:webservices
urn:amazon:cognito:sp:us-west-2_xxxxxxxxx
(Replace xxxxxxxxx with the UserPoolId you got above)Click Create
*
Fetch the SAML-Metadata-IDPSSODescriptor.xml
file from your KeyCloak Server
https://{keycloak-server}/auth/realms/{realm}/protocol/saml/descriptor
(change the DNS of your server and the realm)https://console.aws.amazon.com/cognito/users/
orbit-{YOUR_ENV_NAME}
)keycloak
. For more information, see Choosing SAML Identity Provider Names.For more information, see Creating and managing a SAML identity provider for a user pool (AWS Management Console).
groups
.custom:groups
from the list.emailaddress
.Email
from the list.email_verified
.Email Verified
from the list.username
.Preferred User Name
from the list.For more information, see Specifying identity provider attribute mappings for your user pool.
Parameter Store
{your-env-name}
/contextPool Id
of the User PoolCognitoExternalProviderDomain
and CognitoExternalProviderRedirect
with your configurations:UserPoolId: us-west-X_xXXXxxXXx
CognitoExternalProvider: keycloak
CognitoExternalProviderLabel: KEYCLOAK
# The domain created in Coginto
CognitoExternalProviderDomain: domain.auth.region.amazoncognito.com
# The Orbit Workbench URL
CognitoExternalProviderRedirect: https://a12389bc893fa0980ce08f1000ecf89a.region.elb.amazonaws.com/orbit/login
orbit deploy env -f YOUR_FILE.yaml
You should see a ‘Sign in with Keycloak’ button on the landing page
Sign in with Keycloak