To establish a trust relationship between an enterprise identity provider and the cloud system, upload the metadata file of the cloud system to the identity provider, and then create an identity provider and upload the metadata file of the identity provider on the IAM console.
As an enterprise administrator, you have registered an account in the cloud system and created user groups and granted them permissions in IAM.
The user groups created in IAM will be used to assign permissions to identity provider users mapped to the cloud system.
To establish a trust relationship between the enterprise identity provider and the cloud system, exchange their metadata files.
The cloud system provides different API gateways for users in different regions to call APIs. To allow users to access resources in multiple regions, download metadata files of all these regions.
Create an identity provider and configure the metadata file in IAM.
The identity provider name must be unique under your account.
Configure the metadata file of the enterprise IdP in the cloud system.
IAM provides preconfigured metadata. You can directly use or modify the preconfigured metadata. If you have obtained the metadata file of your enterprise IdP, upload the file.
For a metadata file larger than 500 KB, manually configure the metadata. If the metadata has changed, upload the latest metadata file or edit the existing metadata to ensure that the federated users can log in to the cloud system.
For details about how to obtain the metadata file, see the documentation of the enterprise identity provider.
Parameter |
Mandatory |
Description |
---|---|---|
Entity ID |
Yes |
The unique identifier of an identity provider. Enter the value of entityID displayed in the identity provider metadata file. If the metadata file contains multiple identity providers, choose the one you want to use. |
Protocol |
Yes |
The SAML protocol is used for federated identity authentication between an enterprise identity provider and service provider. |
NameIdFormat |
No |
Enter the value of NameIdFormat displayed in the metadata file. This parameter indicates the username and ID format used for communication between the identity provider and federated users. |
Signing Certificate |
Yes |
Enter the value of <X509Certificate> displayed in the metadata file. A signing certificate is a public key certificate used for signature verification. For security purposes, enter a public key containing no less than 2048 bits. The signing certificate is used during federated identity authentication to ensure that assertions are credible and complete. |
SingleSignOnService |
Yes |
Enter the value of SingleSignOnService displayed in the metadata file. This parameter defines how SAML requests are sent during the SSO process. SingleSignOnService must support HTTP Redirect or HTTP POST. |
SingleLogoutService |
No |
Enter the value of SingleLogoutService displayed in the metadata file. This parameter indicates the address to which federated users will be redirected after logging out their sessions. The SingleLogoutService parameter in the metadata file must support HTTP Redirect or HTTP POST. |
Federated users only have read permissions for the cloud system by default. To assign permissions to federated users, configure identity conversion rules for the identity provider. For more information, see Step 2: Configure Identity Conversion Rules.
To modify the configurations of an identity provider, click Modify at the bottom of the details page.