Skip to end of metadata
Go to start of metadata

Table of Contents

Introduction

Description

AWS Connector allows to manage the Amazon AWS IAM (Identity and Access Management)

Managed Systems

This connector is specific for integration with the Amazon AWS IAM (Identity and Access Management) through the CLI AWS IAM

If your system is not in the previously list, it's possible to include it easily!

For more information to check if your system may be synchronized with this connector you do not hesitate to contact us through our Contact form

Prerequisites

It is needed a AWS IAM user with access and privileges to the required operations.

It cannot detect password changes to be propagated to other systems.

Download and install

This addon is located in the Connectors section and its name is AWS plugin.

For download and install the addon you could review our generic documentation about this process: Addons installation

Agent configuration

Basics

Generic parameters

After the installation of the addon, you may create and configure agent instances.

To configure this AWS connector you must select "Amazon WS" in the attribute "Type" of the generic parameters section in the agents page configuration.

For more information about how you may configure the generic parameters of the agent, see the following link: Agents configuration

Custom parameters

Below there are the specific parameters for this agent implementation:

ParameterDescription
Access KeyAccess key provided by the AWS IAM account
Secret Key
Secret key provided by the AWS IAM account
AWS EndpointAWS endpoint provided by the AWS IAM account
Enable debugTwo options: [ Yes / No ]. When it is enabled more log traces are printed in the Synchronization Server log

Attribute mapping

This connector could manage Users and Roles.

Properties

The following properties are defined for each object type:

Property
Meaning
preventDeletion (optional)

Two options: [ True / False ]. If it is "true", it prevents to delete any no longer needed object

Attributes

Users

The following attributes can be mapped on User objects

Attribute
Value
userNameUser name
pathUser path
arnAWS arn (read only)
createDateCreation date (read only)
passwordLastUsedPasssword last use (read only)
userIdInternal user id

Groups

The following attributes can be mapped on Role (AWS Group) objects:

Attribute
Value
groupNameGroup name
pathGroup path
arnAWS arn (read only)
createDateCreation date (read only)
groupIdInternal group id

For more information about how you may configure attribute mapping, see the following link: Soffid Attribute Mapping Reference

 

 

For example:

Load triggers

Pending to be documented.

Account metadata

Pending to be documented.

Operational

Monitoring

After the agent configuration you could check in the monitoring page if the service is running in the Synchronization Server, please go to "Start Menu > Monitoring and reporting > System monitoring".

Tasks

Authoritative

If you are checked "Authorized identity source", an automatic task to load identities from the managed system to Soffid is available, please go to "Start Menu > Processes and Tasks > Manage automatic tasks", and you will something like "Import authoritative data from <AGENT_NAME>".

Reconcile

If your are configured the "Attribute Mapping" tab with some of our objects: "user, account, role, group or grant", an automatic task to synchronize these objects from the managed system to Soffid is available, please go to "Start Menu > Processes and Tasks > Manage automatic tasks", and you will something like "Reconcile all accounts from <AGENT_NAME>".

Synchronization

About the synchronization of the objects, there are two possible options:

  • If you are checked the generic attribute "Read Only" in the "Basics" tab, only the changes in the managed systems will be updated in Soffid. We recommend this options until the global configuration of Soffid will be tested.
  • If you are not checked the generic attribute "Read Only" in the "Basics" tab, all the changes in Soffid or the managed system will be updated in the other. Note that this synchronization must be configured in the "Attribute mapping" tab correctly.

 

For more information about how you may configure attribute mapping, see the following link: Soffid Attribute Mapping Reference

  • No labels