1. Notes
The notes section for Chapter 5 - Advanced Identities and Federation
Need to break this out from Notes/Demos
AWS SAML 2.0 Identity Federation
Security Assertion Markup Language v2.0 Allows you to INDIRECTLY use on premise IDs with AWS- you cannot use any credentials but AWS Credentials.
- Open Standard used with many IDp's - MS ADFS for example.
- Enterprise Identity Provider AND SAML 2.0 Compatible - is NOT Facebook, Google, etc.
- More than 5000 users
Application Access
This is also considered Legacy infrastructure
Console Access
Can also implement access to the Console via Portal

AWS Single Sign On (SSO)
Manage SSO for AWS Accounts and External Applications
- Flexible Identity Source
- AWS SSO - Built in identity store
- AWS Managed Microsoft AD
- On Prem AD
- External Identity Provider - SAML 2.0
Note: This is preferred by AWS vs any other workforce identity federation

Demo: AWS SSO
- Navigate to the SSO console in the Management account.
- Click enable SSO
a. I got a rate exceeded so I refreshed and tried again.

- You can change the portal URL to something more useful.
- Under the AWS SSO page, click permission sets.
- Click Create permission set, then select administrator access and then select next, add some tags, and then click create permission set.
Repeat until you have the 4 permission sets below:

You can also pick the signed in duration time - I chose 12 hours.
Create a User
- Click on Users on the left and then click New User
- Enter in the information here and then click next.
- We don't have any groups, so click New Group.

- Once the user is created, they will get sent the following email:

Assigning Permissions
- Click on AWS Accounts and then Select all of the accounts that you want this user to have access to
- Click Assign Users
- Click on the groups tab and then select the appropriate group
- Click next and then select the permission set for that group.
Testing Access
- Click on the SSO Url and then log in as the user.
- You should see that user having access to the accounts in your AWS Organization.

Set Up MFA
- Click MFA Devices at the top
- Click the type of registration
- Scan the QR code
- Finish setting up MFA.
- Sign out and sign back in to test.

Congrats, you've built this:

AWS Cognito User and Identity Pools
Cognito is a terrible name - as it is with a lot of AWS Services. AWS Cognito is Authentication, Authorization and User management for web/mobile apps.
Two parts: User pools and identity pools
- User pools - a user directory within Amazon Cognito
- sign in and get a JSON Web Tokens, however, AWS resources don't use JWT's That's all it does.
- Identity pools allow you to offer the access to temporary AWS credentials.