# AWS SSO Configuration

{% hint style="info" %}
For a 100% cloud-based integration with AWS, see [Keeper SSO Connect Cloud](https://docs.keeper.io/sso-connect-cloud)
{% endhint %}

### AWS SSO

Log into AWS and select on AWS Single Sign-On.

<div align="left"><img src="https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6YlbDF24y1m2e3rlj%2F-LU6Z-KretKRf2wh_GLr%2Fsso-step-162b.png?alt=media&#x26;token=c07889d3-dbd3-43fc-aa0c-3c5453f84b08" alt=""></div>

On the SSO Dashboard, select Configure SSO access to your cloud applications.

![](https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6YlbDF24y1m2e3rlj%2F-LU6Z5UOuHjjnmGt2vDn%2Fsso-step-163b.png?alt=media\&token=879fa4cd-17e5-4db6-b7ea-029078eb3af2)

On the Applications menu, select **Add a new application**.

![](https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6YlbDF24y1m2e3rlj%2F-LU6ZDMwh3tGoqujCVYp%2Fsso-step-164b.png?alt=media\&token=8ae0280c-014b-428d-8749-2813b4b3f0bb)

Next select **Keeper Security** and select **Add**.\*\*\\

![](https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6YlbDF24y1m2e3rlj%2F-LU6ZQTvndplN5eAdmxs%2Fsso-step-165b.png?alt=media\&token=2a780b30-d69a-484e-914e-3edc7c092ef5)

{% hint style="info" %}
**Keeper is working with AWS to develop an Application Connector.**
{% endhint %}

Fill in the Display name and Description (optional) in the application details section.

![](https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6YlbDF24y1m2e3rlj%2F-LU6ZnugNqbN-i6WSciI%2Fsso-step-166b.png?alt=media\&token=40e562cc-7065-4a44-9cb1-6eb65fa1f558)

In the AWS SSO metadata section, select the download button to export the AWS SSO SAML metadata file. This file gets imported in the SSO Connect IdP Metadata section on the configuration screen.

![](https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6YlbDF24y1m2e3rlj%2F-LU6ZuC0ianEiUqHiwCu%2Fsso-step-167b.png?alt=media\&token=2074882c-7af7-4290-8e35-3d7d708af35b)

Copy this file to the Keeper SSO Connect server and upload it into the Keeper SSO Connect interface by dragging and dropping the file into the Configuration screen:\
\
Select **Save**.

![](https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6YlbDF24y1m2e3rlj%2F-LU6_1Tr1H8yH4csNUp9%2Fsso-step-168b.png?alt=media\&token=cb51ab75-3fcb-447c-a57d-b8a76d2f2563)

The remaining step on the Keeper SSO Connect Server is to download the Keeper sso\_connect.xml metadata file and upload it to the AWS application.\
\
Select **Export Metadata** on the Keeper SSO Connect.

<div align="left"><img src="https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LlELLNsxWEt_eMnwY5u%2F-LlELNMKVPjjG2VsjMNB%2FConfig_1_D.png?alt=media&#x26;token=5b2815ac-7edf-4864-b030-6856a6ae3f4a" alt=""></div>

Import the sso\_connect.xml file to the Application metadata section on the application configuration screen.

![](https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6YlbDF24y1m2e3rlj%2F-LU6_LnvBfg558esZV5A%2Fsso-step-170b.png?alt=media\&token=221839ff-aa11-47df-b712-a834fea4d9c9)

After saving changes the **Configuration for Keeper Password Manager has been saved** success message will be displayed.

![](https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6_e39t3QfiTxyInJ9%2F-LU6_oLyaZMT6zhsAvaT%2Fsso-step-171b.png?alt=media\&token=783bd188-1e3a-4207-8ff4-12c78dae48a7)

{% hint style="info" %}
**Note: The Keeper SSL certificate cannot be larger than 2048K or the below error will be received.**
{% endhint %}

<div align="left"><img src="https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6_e39t3QfiTxyInJ9%2F-LU6a0AZ_tjzAxORi15N%2Fsso-step-172b.png?alt=media&#x26;token=363582b5-9d9f-4715-85fb-f689b51b84aa" alt=""></div>

* Either, generate a smaller SSL certificate, re-export and import the metadata file or manually set the ACS URL and Audience URL in the AWS SSO application configuration.

Next, Ensure the Keeper application attributes that are to be mapped to AWS SSO are correct (These should be set by default. Select the Attribute mappings tab.\
\
The AWS string value to ${user:subject} and format is blank or unspecified.\
\
The Keeper Attributes are set as follows:

| Keeper Attribute | AWS SSO String Value \*\* | Format      |
| ---------------- | ------------------------- | ----------- |
| Email            | ${user:email}             | unspecified |
| First            | ${user:givenName}         | unspecified |
| Last             | ${user:familyName}        | unspecified |

![](https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6ahWVi2VxJ68TQLD1%2F-LU6amQCWRNnX_yNuQmD%2Fsso-step-173b.png?alt=media\&token=5bacdef6-bdfc-41a5-9209-f9daa6bf7229)

![](https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6ahWVi2VxJ68TQLD1%2F-LU6arFJjYDD9yO8Bdnz%2Fsso-step-174b.png?alt=media\&token=9b7979c8-bb71-4d0e-a227-88a6cce588b3)

{% hint style="info" %}
**Note: If your AWS email is mapped to the AD UPN (which may not be the actual email address of your users) it can be re-mapped to the email address associated in the users AD profile.**
{% endhint %}

To make this change navigate to the **Connect Directory** on the AWS SSO page.

<div align="left"><img src="https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6ahWVi2VxJ68TQLD1%2F-LU6bC4iFKp9VE6tjSmp%2Fsso-step-175b.png?alt=media&#x26;token=5b1ad8c0-3d65-4a54-b374-8601c09262f5" alt=""></div>

Select on the **Edit attribute mappings** button.

<div align="left"><img src="https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6brxNoh1siqJp_RBl%2F-LU6bxcTKZdejEXX5XT4%2Fsso-step-176b.png?alt=media&#x26;token=69b6b742-ac1b-4cf5-ab0a-6cfab36c11bf" alt=""></div>

Change the AWS SSO **email** attribute from ${dir:windowsUpn} to ${dir:email} .

![](https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6brxNoh1siqJp_RBl%2F-LU6c9TTcQGgcOxjVnL_%2Fsso-step-177b.png?alt=media\&token=99717df7-0a31-44f4-8aa4-1c7c8e647332)

Select on the the **Assigned users** tab and then the **Assign users** button to select users or groups to assign the application.

![](https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6brxNoh1siqJp_RBl%2F-LU6cN-XkwPiiuRse8bB%2Fsso-step-178b.png?alt=media\&token=697570f8-47e8-4274-a0b9-07a7016da33e)

On the Assign Users window:

* Select either Groups or Users
* Type the name of a group or user
* Select on the **Search connect directory** to initiate the search.

![](https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6brxNoh1siqJp_RBl%2F-LU6caJ6-qqk81UG4nsd%2Fsso-step-179b.png?alt=media\&token=f7354423-9a55-42ee-b8f1-5931d0991a73)

The results of the directory search will display under the search window.

![](https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6brxNoh1siqJp_RBl%2F-LU6ch7INBbjMwwtxIdu%2Fsso-step-180b.png?alt=media\&token=24a61615-0599-4ae4-a168-e20bcecc4e94)

Select the users/groups that are desired to have access to the application and then select the **Assign users** button.

![](https://2635959690-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LTyMp7XGU8wh-hRPBiB%2F-LU6brxNoh1siqJp_RBl%2F-LU6ctESHNMQ5Whl3yCo%2Fsso-step-181b.png?alt=media\&token=62519f6d-9911-45ef-9075-2ceff6576045)

**Note: Keeper SSO Connect expects that the SAML response is signed. Ensure that your identity provider is configured to sign SAML responses.**

Your Keeper SSO Connect setup is now complete!
