Single Sign-On
Access to the following AgentX components can be managed using your existing enterprise Single Sign-On provider.
Content Designer
Web Client
Reports and Dashboards
Federated authentication uses the SAML2 protocol, which an industry standard for single sign-on.
Note: IdP-initiated sessions are not supported by Amazon Cognito. This means that access cannot be initiated through an SSO portal. Users must access the application through the Content Designer URL.
Gather details for SAML configuration
Before configuring the Identity Provider, begin by gathering the required details from Amazon CloudFormation.
Log on to the AWS Console. Navigate to the service administration page for Amazon CloudFormation, and select the stack that represents the AgentX installation you want to work with.
Select the Outputs tab in the stack details, and locate the outputs containing the SSO integration details.
SAMLEntityID
SAMLReplyURL
UserPoolURL
Make a note of these values as they will be used later.
Identity Provider Configuration
Below you will find instructions to configure your identity provider.
Microsoft Entra (formerly Azure Active Directory)
Create an Enterprise Application
Click New application on the toolbar
Choose Create your own application
Provide a name
Select Integrate any other application you don’t find in the gallery (Non-gallery)
Click Create
Configure Single Sign-On
Select Single Sign On on the left navigation bar
Click the SAML box
Under Basic SAML Configuration, click Edit
For Identifier, enter the SAMLEntityID from the previous section.
For Reply URL, enter the SAMLReplyURL from the previous section. Index can be left blank.
Click Save
Under SAML Certificates, copy the App Federation Metadata Url to use in the next section.
Amazon Cognito configuration
Log on to the AWS Console. Navigate the UserPoolURL link that we saved earlier.
Select Social and custom providers on the left navigation bar.
Click Add identity provider and select SAML.
Enter a Provider name. This is the friendly name for your identity provider. If unsure what to use here, the name of your company is usually appropriate. For example: AcmeCorp or AcmeCorp-SSO. This name will appear in the logon page presented to users. Spaces and underscores are not permitted.
Under Identifiers include the email domain(s) for users who should be directed to this identity provider. Multiple values should be separated by a comma.
Under Metadata document source, choose Enter metadata document endpoint URL
Paste the metadata URL, copied in the previous section.
Include a mapping for the
email
attribute. The SAML attribute name will normally behttp://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
, but check the documentation for your identity provider.Click Add identity provider.
Select App clients on the left navigation bar.
For each client listed, select the client to edit it.
Select the Login pages tab
In the Managed login pages configuration section, click Edit.
Under Identity Providers, add the SAML provider you just created.
Click Save changes
Select the User Pool Properties tab
Click the Add Lambda Trigger button.
Set the typet to Sign-Up and choose Post Confirmation Trigger.
On the Lambda Function tile, assign the AutoAdminFunction. It will have a name like
<stack_name>-AutoAdminFunction-<random-string>
Click Add lambda trigger