Skip to content

Commit

Permalink
feat: add support for aws azuread federation
Browse files Browse the repository at this point in the history
This adds support for using AzureAD to Federate into AWS. Fixes Noovolari#160.
  • Loading branch information
mholttech committed Aug 30, 2021
1 parent 00b89d7 commit 0a7ca2a
Show file tree
Hide file tree
Showing 3 changed files with 8 additions and 2 deletions.
2 changes: 1 addition & 1 deletion docs/use-cases/aws_iam_role.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# AWS IAM Roles

## AWS IAM Federated Role
Federation is established between **G Suite**, **Okta**, **OneLogin** and **AWS**. No more AWS credentials
Federation is established between **G Suite**, **Okta**, **OneLogin**, **AzureAD**, and **AWS**. No more AWS credentials
management is needed.

Leapp allows you to get to cloud resources with company email and password.
Expand Down
2 changes: 1 addition & 1 deletion docs/use-cases/intro.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,5 +21,5 @@ The use cases covered by Leapp are the following:
- **OneLogin to AWS** - :white_check_mark:
- **G Suite to Azure** - :white_check_mark:
- **AZURE AD to Azure** - :white_check_mark:
- **AZURE AD to AWS** - :soon:
- **AZURE AD to AWS** - :white_check_mark:
- **AWS Single Sign-On** - :white_check_mark:
Original file line number Diff line number Diff line change
Expand Up @@ -164,6 +164,7 @@ export class AwsIamRoleFederatedService extends AwsSessionService {
'https://*.onelogin.com/*',
'https://*.okta.com/*',
'https://accounts.google.com/ServiceLogin*',
'https://login.microsoftonline.com/*',
'https://signin.aws.amazon.com/saml'
]
};
Expand All @@ -186,6 +187,11 @@ export class AwsIamRoleFederatedService extends AwsSessionService {
idpWindow = null;
resolve(true);
}
// AzureAD
if (details.url.indexOf('login.microsoftonline.com') !== -1) {
idpWindow = null;
resolve(true);
}
// Do not show window: already logged by means of session cookies
if (details.url.indexOf('signin.aws.amazon.com/saml') !== -1) {
idpWindow = null;
Expand Down

0 comments on commit 0a7ca2a

Please sign in to comment.