Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: added identity-center.md doc for AWS SSO #15689

Merged
merged 12 commits into from
Oct 27, 2023
Binary file added docs/assets/identity-center-1.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/assets/identity-center-2.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/assets/identity-center-3.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/assets/identity-center-4.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/assets/identity-center-5.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/assets/identity-center-6.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
78 changes: 78 additions & 0 deletions docs/operator-manual/user-management/identity-center.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,78 @@
# Identity Center (AWS SSO)

!!! note "Are you using this? Please contribute!"
If you're using this IdP please consider [contributing](../../developer-guide/site.md) to this document.

A working Single Sign-On configuration using Identity Center (AWS SSO) has been achieved using the following method:

* [SAML (with Dex)](#saml-with-dex)

## SAML (with Dex)

1. Create a new SAML application in Identity Center and download the certificate.
* ![Identity Center SAML App 1](../../assets/identity-center-1.png)
* ![Identity Center SAML App 2](../../assets/identity-center-2.png)
1. Click `Assign Users` after creating the application in Identity Center and select the users or user groups you want to allow to use this application..
zeusal marked this conversation as resolved.
Show resolved Hide resolved
* ![Identity Center SAML App 3](../../assets/identity-center-3.png)
1. Copy the Argo CD URL to the `argocd-cm` in the data.url
zeusal marked this conversation as resolved.
Show resolved Hide resolved

<!-- markdownlint-disable MD046 -->
```yaml
data:
url: https://argocd.example.com
```
1. Configure Attribute mappings
zeusal marked this conversation as resolved.
Show resolved Hide resolved
* ![Identity Center SAML App 4](../../assets/identity-center-4.png)
* ![Identity Center SAML App 5](../../assets/identity-center-5.png)

<!-- markdownlint-disable MD046 -->
zeusal marked this conversation as resolved.
Show resolved Hide resolved

1. Download the CA certificate to use in the `argocd-cm` configuration.
* If you are using this in the caData field, you will need to pass the entire certificate (including `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----` stanzas) through base64 encoding, for example, `base64 my_cert.pem`.
zeusal marked this conversation as resolved.
Show resolved Hide resolved
* If you are using the ca field and storing the CA certificate separately as a secret, you will need to mount the secret to the `dex` container in the `argocd-dex-server` Deployment.
zeusal marked this conversation as resolved.
Show resolved Hide resolved
* ![Identity Center SAML App 6](../../assets/identity-center-6.png)
1. Edit the `argocd-cm` and configure the `data.dex.config` section:

<!-- markdownlint-disable MD046 -->
```yaml
dex.config: |
logger:
level: debug
format: json
connectors:
- type: saml
id: aws
name: "AWS IAM Identity Center"
config:
# You need value of Identity Center APP SAML (IAM Identity Center sign-in URL)
ssoURL: https://portal.sso.yourregion.amazonaws.com/saml/assertion/id
# You need `caData` _OR_ `ca`, but not both.
caData: <CA cert (IAM Identity Center Certificate of Identity Center APP SAML) passed through base64 encoding>
# Path to mount the secret to the dex container
entityIssuer: https://external.path.to.argocd.io/api/dex/callback
redirectURI: https://external.path.to.argocd.io/api/dex/callback
usernameAttr: email
emailAttr: email
groupsAttr: groups
```
<!-- markdownlint-enable MD046 -->

### Connect Identity Center Groups to Argo CD Roles
Argo CD is aware of user memberships of Identity Center groups that match the *Group Attribute Statements* regex.
zeusal marked this conversation as resolved.
Show resolved Hide resolved
The example above uses the `argocd-*` regex, so Argo CD would be aware of a group named `argocd-admins`.
zeusal marked this conversation as resolved.
Show resolved Hide resolved

Modify the `argocd-rbac-cm` ConfigMap to connect the `ArgoCD-administrators` Identity Center group to the builtin Argo CD `admin` role.
<!-- markdownlint-disable MD046 -->
```yaml
apiVersion: v1
kind: ConfigMap
metadata:
name: argocd-rbac-cm
data:
policy.csv: |
g, <Identity Center Group ID>, role:admin
scopes: '[groups, email]'
```

<!-- markdownlint-disable MD046 -->
<!-- markdownlint-enable MD046 -->
zeusal marked this conversation as resolved.
Show resolved Hide resolved
1 change: 1 addition & 0 deletions mkdocs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,7 @@ nav:
- operator-manual/user-management/openunison.md
- operator-manual/user-management/google.md
- operator-manual/user-management/zitadel.md
- operator-manual/user-management/identity-center.md
- operator-manual/rbac.md
- Security:
- Overview: operator-manual/security.md
Expand Down
Loading