As the enterprise administrator, you can manage identities and permissions of federated users in the enterprise identity provider. By configuring identity conversion rules, you can map the identities and permissions of federated users to the cloud system and control their access to specific resources.
An identity provider has been created in the cloud system, and the login link of the identity provider is accessible. (For details about how to create and verify an identity provider, see Step 1: Create an Identity Provider.)
If you configure identity conversion rules by clicking Create Rule, IAM converts the rule parameters to the JSON format. Alternatively, you can click Edit Rule to configure rules in the JSON format.
Parameter |
Description |
Remarks |
---|---|---|
Username |
Username of federated users to be displayed in the cloud system |
To distinguish federated users from users of the cloud system, it is recommended that you set the username to "FederationUser-IdP_XXX". IdP indicates an identity provider name, for example, AD FS and Shibboleth. XXX indicates a custom name. You can also set the federated username to a simple expression, for example, FederationUser-IdP_{email}. After the rule is created successfully, {email} is automatically replaced with the email address of each federated user. The rule takes effect only if a returned assertion contains an email address. NOTICE:
Each federated username must be unique under your account. Identical usernames under one or more identity providers of the same account will be identified as the same federated user in the cloud system. |
User Group |
User groups to which the federated users will belong in the cloud system |
Federated users will inherit permissions from the groups to which they belong. |
Rule Conditions |
Conditions that a federated user must meet to obtain permissions from the selected user groups |
Federated users who do not meet these conditions cannot access the cloud system. You can create a maximum of 10 conditions for an identity conversion rule. NOTE:
|
For example, set an identity conversion rule for enterprise administrators.
If a message indicating that the JSON file is incomplete is displayed, modify the statement or click Cancel to cancel the modifications.
After configuring identity conversion rules, verify the permissions of federated users.
On the Identity Providers page of the IAM console, click View in the row containing the identity provider. Copy the login link displayed on the identity provider details page, open the link using a browser, and then enter the username and password.
For example, an identity conversion rule has defined full permissions for all cloud services for federated user ID1 in the admin user group. On the management console, select any cloud service, and check if you can access the service.