Identity Center (AWS SSO)

Are you using this? Please contribute!

If you’re using this IdP please consider contributing to this document.

A working Single Sign-On configuration using Identity Center (AWS SSO) has been achieved using the following method:

SAML (with Dex)

  1. Create a new SAML application in Identity Center and download the certificate.
    • Identity Center SAML App 1
    • Identity Center SAML App 2
  2. Click Assign Users after creating the application in Identity Center, and select the users or user groups you wish to grant access to this application.
    • Identity Center SAML App 3
  3. Copy the Argo CD URL into the data.url field in the argocd-cm ConfigMap.

    1. data:
    2. url: https://argocd.example.com
  4. Configure Attribute mappings.

    Group attribute mapping is not officially!

    Group attribute mapping is not officially supported in the AWS docs, however the workaround is currently working.

    • Identity Center SAML App 4
    • Identity Center SAML App 5
  5. Download the CA certificate to use in the argocd-cm configuration.

    • If using the caData field, you’ll need to base64-encode the entire certificate, including the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- stanzas (e.g., base64 my_cert.pem).
    • If using the ca field and storing the CA certificate separately as a secret, you will need to mount the secret onto the dex container in the argocd-dex-server Deployment.
    • Identity Center SAML App 6
  6. Edit the argocd-cm and configure the data.dex.config section:
  1. dex.config: |
  2. logger:
  3. level: debug
  4. format: json
  5. connectors:
  6. - type: saml
  7. id: aws
  8. name: "AWS IAM Identity Center"
  9. config:
  10. # You need value of Identity Center APP SAML (IAM Identity Center sign-in URL)
  11. ssoURL: https://portal.sso.yourregion.amazonaws.com/saml/assertion/id
  12. # You need `caData` _OR_ `ca`, but not both.
  13. caData: <CA cert (IAM Identity Center Certificate of Identity Center APP SAML) passed through base64 encoding>
  14. # Path to mount the secret to the dex container
  15. entityIssuer: https://external.path.to.argocd.io/api/dex/callback
  16. redirectURI: https://external.path.to.argocd.io/api/dex/callback
  17. usernameAttr: email
  18. emailAttr: email
  19. groupsAttr: groups

Connect Identity Center Groups to Argo CD Roles

Argo CD recognizes user memberships in Identity Center groups that match the Group Attribute Statements regex.

In the example above, the regex argocd-* is used, making Argo CD aware of a group named argocd-admins.

Modify the argocd-rbac-cm ConfigMap to connect the ArgoCD-administrators Identity Center group to the builtin Argo CD admin role.

  1. apiVersion: v1
  2. kind: ConfigMap
  3. metadata:
  4. name: argocd-rbac-cm
  5. data:
  6. policy.csv: |
  7. g, <Identity Center Group ID>, role:admin
  8. scopes: '[groups, email]'