Menu
Amazon Cognito
Developer Guide

Integrating Third-Party SAML Identity Providers with Amazon Cognito User Pools

To configure third-party SAML 2.0 identity provider solutions to work with federation for Amazon Cognito User Pools, you must enter a redirect or sign-in URL, which is https://<yourDomainPrefix>.auth.<region>.amazoncognito.com/saml2/idpresponse. You can find your domain prefix and the region value for your user pool on the Domain name tab of the Amazon Cognito console.

Note

Any SAML identity providers that you created in a user pool during the public beta before August 10, 2017 have redirect URLs of https://<yourDomainPrefix>.auth.<region>.amazoncognito.com/login/redirect. If you have one of these SAML identity providers from the public beta in your user pool, you must either:

  • Replace it with a new one that uses the new redirect URL.

  • Update the configuration in your SAML identity provider to accept both the old and new redirect URLs.

All SAML identity providers in Amazon Cognito will switch to the new URLs, and the old ones will stop working on October 31, 2017.

For some SAML Identity providers you must provide the urn / Audience URI / SP Entity ID, in the form urn:amazon:cognito:sp:<yourUserPoolID>. You can find your user pool ID on the App client settings tab in the Amazon Cognito console.

You must also configure your SAML identity provider to provide attributes values for any attributes required in your user pool. Typically, email is a required attribute for user pools, and in that case the SAML identity provider will need to provide an email value (claim) in the SAML assertion.

The following links help you configure third-party SAML 2.0 identity provider solutions to work with federation for Amazon Cognito User Pools.

Note

Identity provider support is built in to Amazon Cognito, so you only need to go to the following provider sites to get the SAML metadata document. You may see further instructions on the provider website about integrating with AWS, but you won't need those.

Solution More information
Microsoft Active Directory Federation Services (AD FS) You can download the SAML metadata document for your ADFS federation server from the following address: https://<yourservername>/FederationMetadata/2007-06/FederationMetadata.xml.
Okta Once you have configured your Amazon Cognito User Pool as an application in Okta, you can find the metadata document in the Admin section of the Okta dashboard. Choose the application, select the Sign On section, and look under the Settings for SAML. The URL should look like https://<app-domain>.oktapreview.com/app/<application-ID>/sso/saml/metadata.
Auth0 The metadata download document is obtained from the Auth0 dashboard. Choose Clients, and then choose Settings. Scroll down, choose Show Advanced Settings, and then look for your SAML Metadata URL. It should look like https://<your-domain-prefix>.auth0.com/samlp/metadata/<your-Auth0-client-ID>.
Ping Identity For PingFederate, you can find instructions for downloading a metadata XML file in Provide general SAML metadata by file.