AWS Contact Center
Configure Single Sign-On for Amazon Connect Using Okta
Securing access to your IT resources is paramount. As the number of web-based applications that your employees access increases, so does the difficulty for them to remember their login credentials. Many companies have turned to single sign-on with a variety of identity providers to streamline access to resources and simplify their employees’ routines. With Amazon Connect, you can use any SAML 2.0 compliant identity provider to provide credentialed access to your contact center. This post walks you through the steps required to use Okta as the identity provider for Amazon Connect.
Okta is identity and access management company which provides on=premise and cloud-based identity services using SAML 2.0 authentication. While setting up Okta is similar configuring other SAML providers, this post specifically describes the steps for using Okta. This simplifies the general guidance that describes how to configure SAML for identity management in Amazon Connect.
The configuration for the purposes of this post uses:
To complete the steps in this post, you need the following:
- An active AWS account.
- IAM rights to create new IAM roles, policies, and users.
- IAM rights to create a new Amazon Connect instance.
- An Okta account. For this post, we show the steps using a developer account in Okta’s Workforce Identity Cloud.
This is functionally no different from a standard account.
Create an Amazon Connect Instance
For Amazon Connect, define the identity management system that is used at instance creation. Once it is chosen, it cannot be changed. As such, you might need to create a new Amazon Connect instance to integrate with Okta. For the purposes of this blog post, most of the details of the Amazon Connect configuration are not be discussed. For more information about how to configure an Amazon Connect instance, see the Getting Started with Amazon Connect section of the Amazon Connect Administrator Guide.
To create a new Amazon Connect instance with SAML 2.0-based authentication:
- Open the Amazon Connect Console in the AWS Management Console.
- Make sure to select the Region that you would like to use
- Do one of the following:
- If you have not previously created an Amazon Connect instance in the selected Region, choose Get Started.
- If you have previously created an Amazon Connect instance in the selected Region, choose Add an Instance.
- On the Set identity page, choose SAML 2.0-based authentication
- For Access URL, enter an instance alias for your instance, and choose Next step.Note: The name that you enter is displayed as the instance alias in the AWS Management Console, and is used as the domain in the access URL when setting up Okta. The alias must be globally unique and cannot be changed after the instance is created.
- On the Add Administrator page, enter the First Name, Last Name, and Username for the account to use as the administrator for your instance, and choose Next step. This should be an account that already exists in Okta.Note: It is critical that the user name entered matches the user name in Okta exactly, including the case.
- On the Telephony Options page, keep the defaults selected (you can change this later), and choose Next.
- On the Data Storage page, keep the defaults selected (you can change this later), and choose Next.
- Review and create, review your settings, and choose Create instance.
- After your instance has been created, select the Get started button to start the guided initial setup experience, or refer to the Set up your contact center section of the Amazon Connect Documentation to complete the setup of your contact center.
Now that your Amazon Connect instance has been created, create AWS Identity and Access Management policies that control which resources Okta has access to.
Create the IAM policies
For the SAML integration to work, create the appropriate policies that grant access to specific resources and rights. Two required policies will be created. The first policy enables federation for all users in a specific Amazon Connect instance. The second allows Okta to list IAM roles and account aliases.
To create the Amazon Connect Federation policy:
- Open the IAM Console.
- In the navigation pane, choose Policies.
- Choose Create policy.
- Choose the JSON tab.
- Paste the following policy into the editor, replacing the existing content:
{ "Version":"2012-10-17", "Statement":[ { "Sid":"Statement1", "Effect":"Allow", "Action":"connect:GetFederationToken", "Resource":[ "**YOUR ARN**/user/${aws:userid}" ] } ] }
- Replace **YOUR ARN** with the ARN for your Amazon Connect instance. To find your ARN:
- Open a new tab and go to the Amazon Connect Console.
- Choose your instance alias.
- Copy the value for the instance ARN.
- Verify the replacement, and choose Next.
- Name your policy okta_federation_policy, or something similar.
- Optionally, provide a description for the policy.
- Choose Create policy.
To create the Okta access policy:
- Open the IAM Console.
- In the navigation pane, choose Policies.
- Choose Create policy.
- Choose the JSON tab.
- Paste the following policy into the editor, replacing the existing content:
{ "Version":"2012-10-17", "Statement":[ { "Effect":"Allow", "Action":[ "iam:ListRoles", "iam:ListAccountAliases" ], "Resource":"*" } ] }
- Verify the replacement, and choose Next.
- Name the policy okta_cli_policy, or something similar.
- Optionally, provide a description for the policy.
- Choose Create policy.
- Once the policies have been created, create the IAM user that has programmatic access to AWS resources. This lets Okta to retrieve the appropriate resources from your AWS account.
To create the user:
- Open the IAM console.
- In the navigation pane, choose Users.
- Choose Add user.
- In the Set user details section, provide a User name, such as okta_cli_user.
- Leave Provide user access to the AWS Management Console – optional option deselected.
- Choose Next.
- In the Set permissions section, choose Attach existing policies directly.
- In the search field, enter okta. The available policies filter.
- Choose the okta_cli_policy policy that you created previously.
- Choose Next.
- Review the settings, then select Create user.
- Once the user is created, select the user name to open the user details.
- Select the Security credentials tab.
- Find the Access keys section, and select Create access key.
- Choose Third-party service, select the box to indicate that have seen the alternative recommendation, then select Next.
- Enter a description tag, if you like, then select Create access key.
- On the Retrieve access keys page, select Download .csv file to download the credential file, then choose Done.
Now that the user has been created, add the Amazon Web Services app to Okta and build the IAM Identity provider simultaneously. This is required, as each depends on information from the other. You start with the Okta Amazon Web Services App.
To add the Amazon Web Services application to Okta and create the Identity Provider:
- Login to your Okta administrator account.
- Select Applications, then choose Browse App Catalog.
- In the search bar, enter AWS Account Federation, then select AWS Account Federation from the popup list.
- Choose Add Integration on the detail page.
- For the Application label, enter Amazon Connect Administrator.
- In the Your AWS Login URL, enter https://console.aws.amazon.com/.
- Keep the defaults for all other boxes, and choose Next.
- On the Sign-On Options page, in the Sign On Methods section, choose SAML 2.0.
- In the SAML 2.0 section, for the Default Relay State, enter the URL as follows:https://region-id.console.aws.amazon.com/connect/federate/instance-id
- Replace the region-id with the Region name where you created your Amazon Connect instance, such as us-east-1 for US East (N. Virginia). Replace the instance-id with the instance ID for your instance.
- To find your instance ID:
- Open a new tab and go to the Amazon Connect Console.
- Choose your instance alias.
- The instance ID is everything after the last / in the Instance ARN. For example:arn:aws:connect:us-west-2:123456789:instance/00aa11b2-c333-4d55-e6f7-888g9999hh0
- Copy the URL for the Metadata details, open the URL in a new tab, and save the xml file to your computer as okta_metadata.xml.
- Do not close this tab. You need to continue the setup shortly.
- Open a new tab and go to the IAM Console.
- In the navigation pane, choose Identity Providers.
- Choose Add provider.
- Choose SAML as the Provider Type.
- For Provider Name, enter Okta_Connect_Admin.
- In the Metadata Document section, choose the metadata.xml document that you saved in step 12.
- Choose Add provider.
- Once the creation completes, choose Okta_Connect_Admin to view the details.
- Copy the Provider ARN and paste it to a text file for future use.
- In the IAM console, in the navigation pane, choose Roles.
- Choose Create role.
- Choose SAML 2.0 federation.
- In the SAML provider section, choose Okta_Connect_Admin.
- Choose Allow programmatic and AWS Management Console access.
- Choose Next.
- In Filter policies, enter okta.
- Select both policies that you created earlier.
- Choose Next.
- For Role name, enter Okta_Role.
- Choose Create Role.
- Return to the Okta tab.
- In the Advanced Sign-On Settings section, paste the Identity Provider ARN that you copied into the Identity Provider ARN field.
- Choose Done.
Now that the app is built, give it access to AWS. To do this, you need the credentials file you downloaded earlier.
To provide Okta with programmatic access:
- While logged in to Okta Administrator, choose Applications.
- Choose Amazon Connect Administrator.
- Choose Provisioning.
- Choose Configure API Integration.
- Choose Enable API Integration.
- In the Access Key field, paste the access key from your credentials.csv file.
- In the Secret Key field, paste the secret key from your credentials.csv file.
- Choose Test API Credentials.
- After the credentials are verified successfully, choose Save.
- In the Settings menu, choose To App.
- Choose Edit.
- Enable Create Users.
- Select Save.
- After the page refreshes, scroll to the bottom of the page to the Amazon Connect Administrator Attribute Mappings section. You should see a list of attributes.
After you have provided Okta with programmatic access, you are ready to assign the application to users. Complete this in the Okta administrator.
To assign the new application to your admin user:
- While logged in to Okta Administrator, choose Directory.
- Choose the admin user that you configured when you built your Amazon Connect instance.
- Choose Assign Applications.
- Choose Assign next to Amazon Connect Administrator.
- In the Role drop-down, select Okta_Role.
- Choose the SAML User Role Okta_Role.
- Choose Save and Go Back.
- Choose Done.
To test the application:
- Login to Okta as your configured Amazon Connect administrator.
- Choose Amazon Connect Administrator.
- A new tab opens. Perform the authentication, then redirect to Amazon Connect.
- You should now be logged in to Amazon Connect as the administrator.
You now have an Amazon Connect Administrator app that uses SAML Authentication from Okta to login to Amazon Connect. To build a second application that launches the Amazon Connect Contact Control Panel (CCP), you would perform the many of the same steps, not including the Amazon Connect instance creation.
In summary:
- Create a new Application in Okta.
- Create a new Identity Provider in IAM.
- Create a new IAM role that uses the new Identity Provider.
- Complete the application setup using a modified relay URL that points to the CCP specifically using the following example:
https://us-east-1.console.aws.amazon.com/connect/federate/instance-id?destination=%2Fconnect%2Fccp-v2
- Configure API access for the app.
- Enable provisioning.
- Assign the app to users.
- Create the Agent users in Amazon Connect.NOTE: It is critical that the user name entered matches the username in Okta exactly, including case sensitivity.
How This Works
Using a federation application like Okta allows users to navigate and log into Amazon Connect with the proper credentials, permissions, and security controls.
SAML requests go through the following steps:
- The user either launches the Okta App or navigates to the URL Okta generates.
- Okta requests authentication from the organization’s identity store.
- The identity store authenticates the user and returns the authentication response to the federation service.
- When authentication is successful, the federation service posts the SAML assertion to the user’s browser.
- The user’s browser posts the SAML assertion to the AWS sign in SAML endpoint (https://signin.aws.amazon.com/saml). AWS sign-in receives the SAML request, processes the request, authenticates the user, and forwards the authentication token to Amazon Connect.
- Using the authentication token from AWS, Amazon Connect authorizes the user and opens Amazon Connect in their browser.
Conclusion
This post walked you through the creation and configuration of the Okta app, the configuration of the AWS Identity Provider and Amazon Connect. This allows users and administrators at your company to log in to Amazon Connect using a familiar and secure process through the Okta interface.
If you are using a SSO product other than Okta, the same principals and AWS configurations apply, but the configuration of the SSO application varies depending on the application.
For more information about Amazon Connect Single Sign configuration, see Configure SAML for Identity Management in Amazon Connect. For more information about Amazon Connect, see the Amazon Connect documentation.