diff --git a/product_docs/docs/biganimal/release/getting_started/identity_provider/aws_sso.mdx b/product_docs/docs/biganimal/release/getting_started/identity_provider/aws_sso.mdx new file mode 100644 index 00000000000..7a5d2f96482 --- /dev/null +++ b/product_docs/docs/biganimal/release/getting_started/identity_provider/aws_sso.mdx @@ -0,0 +1,62 @@ +--- +title: "Using Amazon Web Services Single Sign-On as your identity provider" +navTitle: "AWS SSO" +description: "Using AWS SSO as your identity provider for your Azure account" +--- + +## Prerequisites + +- To connect BigAnimal to Amazon Web Services Single Sign-On (AWS SSO), your AWS account must have administrator access. + +- A unique URL and access code are provided in an email from cloudcare@enterprisedb.com. Contact [cloudcare@enterprisedb.com](mailto:cloudcare@enterprisedb.com) if you don't receive the email. The URL becomes invalid after you set up your identity provider with BigAnimal. For issues with the code or identity provider setup, contact [Support](/biganimal/release/overview/support). + +## Set up BigAnimal with AWS SSO + +1. To access the Set Up Identity Provider page in BigAnimal, open the link in the email sent from cloudcare@enterprisedb.com. +1. You will be copying and pasting between BigAnimal and AWS so in a separate browser tab or window log into your AWS account and go to the [**AWS SSO console**](https://console.aws.amazon.com/singlesignon). +1. Choose **Enable AWS SSO** if SSO isn't already enabled on your account. + !!! note + You may need to switch to a region where SSO is enabled. AWS Organizations support SSO in only one region at a time. + !!! +1. Navigate to the Applications page by either selecting **Applications** from the left navigation pane or selecting the link in step 3 on the Welcome to AWS Single Sign-On page. +1. On the Applications page, select **Add a new application**. On the Add New Application page: + 1. Select **Add a custom SAML 2.0 application**. + + 1. Name the application in the **Display Name** field. The application will be visible to your users under this name. +1. At the bottom of the page under **Application metadata**, select the link "If you don't have a metadata file...". + 1. Open the Set Up Identity Provider page in BigAnimal. + + 2. Copy the following information from BigAnimal and paste it into the Application metadata section. + + | Copy from BigAnimal | Paste into Application Metadata | + | ------------------------------ | ------------------------------- | + | Assertion Consumer Service URL | Applciation ACS URL | + | Audience URI | Application SAML audience | + +1. Select **Save changes** at the bottom of the AWS page. +1. Go to your newly-created application (appearing under its display name) and select the **Attribute mappings** tab. +1. Enter your desired attribute configuration. We reccomend the following: + + | User attribute in the application | Maps to this string value or user attribute in AWS SSO | Format | + | --------------------------------- | ------------------------------------------------------ | ------------ | + | Subject | ${user:email} | emailAddress | + | /givenname | ${user:givenName} | basic | + | /surname | ${user:familyName} | basic | + | /name | ${user:preferredUsername} | basic | + | /emailaddress | ${user:email} | basic | + + Where is http://schemas.xmlsoap.org/ws/2005/05/identity/claims. +1. Go to the **Assigned users** tab and select the **Assign users** button to allow users access to the application. +1. Go to the **Configuration** tab and scroll down to the **AWS SSO metadata** section. + 1. Copy the **AWS SSO sign-in URL**. + + 2. Select **Download certificate** to install the AWS SSO certificate. +1. On the Setup Identity Provider page in BigAnimal, select the **Setup Config** tab. + 1. Paste the **AWS SSO sign in URL** into the **Single Sign-On URL** field. + + 1. Select **Choose File** and choose the **AWS SSO certificate** from your files. + 1. Select HTTP-POST for the **Request Binding**. + 1. Enter a **Response Signature Algorithm**. We reccomend rsa-sha256. + 1. Select **Test Connection**. + 1. Enter the AWS user credentials that you granted access. + 1. If the Test Connections is successful, then select **Sign in to BigAnimal** to complete the setup process in the BigAnimal portal. diff --git a/product_docs/docs/biganimal/release/getting_started/identity_provider/index.mdx b/product_docs/docs/biganimal/release/getting_started/identity_provider/index.mdx index 6eb95101867..bf04e97c5fa 100644 --- a/product_docs/docs/biganimal/release/getting_started/identity_provider/index.mdx +++ b/product_docs/docs/biganimal/release/getting_started/identity_provider/index.mdx @@ -75,6 +75,7 @@ You add users through your identity provider. A user who is added in the identit For step-by-step instructions for setting up specific identity providers, see: - [Using Auth0 as your identity provider](auth0) +- [Using AWS SSO as your identity provider](aws_sso) - [Using Azure AD as your identity provider](azure_ad) - [Using Google Workspace (G Suite) as your identity provider](google) - [Using Okta as your identity provider](okta) diff --git a/product_docs/docs/mysql_data_adapter/2/02_requirements_overview.mdx b/product_docs/docs/mysql_data_adapter/2/02_requirements_overview.mdx index 3b13bd15b2b..4ce960bc4c1 100644 --- a/product_docs/docs/mysql_data_adapter/2/02_requirements_overview.mdx +++ b/product_docs/docs/mysql_data_adapter/2/02_requirements_overview.mdx @@ -1,5 +1,5 @@ --- -title: "Supported database and MySQL versions" +title: "Supported database and versions" --- ## Supported database versions