FusionAuth
    • Home
    • Categories
    • Recent
    • Popular
    • Pricing
    • Contact us
    • Docs
    • Login

    AWS identity provider integration

    Scheduled Pinned Locked Moved Solved
    Q&A
    3
    11
    1.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • danD
      dan @cnsmith
      last edited by

      @cnsmith I haven't done this integration myself, but if AWS supports SAML or OIDC, it should work. You might give it a go and share more details of any issues you are running into. Please let us know what you find!

      --
      FusionAuth - Auth for devs, built by devs.
      https://fusionauth.io

      1 Reply Last reply Reply Quote 0
      • C
        cnsmith
        last edited by cnsmith

        I was able to setup fusionauth as an AWS IdP. When AWS Client VPN tries to connect it redirects to fusionauth login, but throws this error. Any suggestions?

        {
        "code" : "Requester",
        "message" : "The AuthnRequest contained an invalid issuer [urn:amazon:webservices:clientvpn] that does not map to an Application in FusionAuth"
        }

        I would expect fusionauth to issue a login page where the user would login which would then grant access to the VPN.

        danD 1 Reply Last reply Reply Quote 0
        • danD
          dan @cnsmith
          last edited by

          @cnsmith Have you turned on debug logging? If you do that and check the Event Log (System -> Event Log) that might provide additional details.

          --
          FusionAuth - Auth for devs, built by devs.
          https://fusionauth.io

          C 1 Reply Last reply Reply Quote 0
          • C
            cnsmith @dan
            last edited by

            @dan I do have debugging on but Im not seeing anything in the logs.

            C 1 Reply Last reply Reply Quote 0
            • C
              cnsmith @cnsmith
              last edited by cnsmith

              @dan I was able to fix that error by making the entity ID urn:amazon:webservices:clientvpn. Seems obvious now.

              1 Reply Last reply Reply Quote 0
              • C
                cnsmith
                last edited by

                @dan

                Fusionauth prompts the client for their username and password. Upon logging in it redirects me back to the base URL https://auth.<company>.com which throws a 405 status code. Error pasted below. I updated my cors to allow post methods and a bunch of headers as well as that url. Any suggestions?

                This page isn’t workingIf the problem continues, contact the site owner.
                HTTP ERROR 405

                1 Reply Last reply Reply Quote 0
                • C
                  cnsmith
                  last edited by

                  Proxy logs shows the 405 and &userState=AuthenticatedRegistrationNotVerified

                  1 Reply Last reply Reply Quote 0
                  • C
                    cnsmith
                    last edited by

                    I was able to get the integration to work by setting Authorized redirect URLs to localhost:35001 per the aws vpn client documentation.

                    danD 1 Reply Last reply Reply Quote 0
                    • C cnsmith has marked this topic as solved on
                    • danD
                      dan @cnsmith
                      last edited by

                      @cnsmith Did you get everything working or are there still issues?

                      --
                      FusionAuth - Auth for devs, built by devs.
                      https://fusionauth.io

                      1 Reply Last reply Reply Quote 0
                      • T
                        titustabitha84
                        last edited by

                        Since the original post is from two years ago, it's important to consider that the technology landscape and integration options may have evolved since then.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post