Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Enable SCIM for your Identity Center directory:

  1. Sign into the Identity account from your AWS landing zone.

  2. From AWS IAM Identity Center settings, within the Automatic provisioning information box, choose Enable.

  3. Save the displayed SCIM endpoint and Access token.

  4. Create a new Terraform module in the infrastructure repository under sso-sync/secrets to store the credentials:

    Code Block
    module "secret" {
      source = "github.com/thoughtbot/terraform-aws-secrets//secret?ref=v0.4.0"
    
      description = "Secrets for deploying the AWS/Google SSO Sync Lambda"
      name        = "aws-google-sso-sync"
    
      initial_value = jsonencode({
        GoogleCredentials       = ""
        SCIMEndpointAccessToken = ""
        SCIMEndpointUrl         = ""
      })
    }
    
  5. Apply the Terraform module.

  6. From AWS Secrets Manager, find the created secret.

  7. Click Retrieve Secret Value and then click Edit.

  8. Copy the contents of the JSON credentials file you downloaded into the GoogleCredentials field.

  9. Fill in the SCIMEndpointAccessToken and SCIMEndpointUrl values you saved earlier.

  10. Click Save.

  11. Create a new Terraform module to deploy the SSOSync Lambda:

    Code Block
    module "lambda" {
      source = "github.com/thoughtbot/terraform-aws-google-sso?ref=v0.1.0"
    
      google_admin_email         = "google-admin@example.com"
      google_credentials         = local.secrets.GoogleCredentials
      google_group_match         = "email:aws-*"
      name                       = "aws-google-sso-sync"
      scim_endpoint_access_token = local.secrets.SCIMEndpointAccessToken
      scim_endpoint_url          = local.secrets.SCIMEndpointUrl
      semantic_version           = "2.0.2"
    }
    
    locals {
      secrets = jsondecode(
        data.aws_secretsmanager_secret_version.sso_sync.secret_string
      )
    }
    
    data "aws_secretsmanager_secret_version" "sso_sync" {
      secret_id = "aws-google-sso-sync"
    }
  12. Apply the module.

IAM Identity Center will now automatically synchronize matched groups and users from your Google domain.