Setting up Amazon Q Business with Microsoft Entra ID as identity provider
Important
Starting April 30, 2024, all new applications will need to use IAM Identity Center directly to manage user access. No new applications can be created using the legacy identity management flow. All existing Amazon Q Business applications using legacy identity management will need to migrate to using IAM Identity Center for user management by July 29, 2024. We recommend you integrate any new application you're creating directly with IAM Identity Center.
The following steps show how to set up Amazon Q Business with Microsoft Entra ID (formerly Azure Active Directory) as your SAML 2.0-compliant identity provider. Integrating Amazon Q Business with Entra ID requires that you switch between tasks on the Amazon Q Business console and in the Entra ID portal.
Prerequisites
Before you start to integrate Amazon Q Business with Entra ID, make sure that you have completed the following tasks:
-
Created an Amazon Q Business application, selected a retriever, added your desired data sources, and previewed Amazon Q Business web experience.
-
Created an Entra ID instance, provisioned at least one user, and provided each user with a valid email address.
To integrate Amazon Q Business with Entra ID
-
In the Amazon Q Business console, choose the Amazon Q Business application you want to integrate with Entra ID.
-
On the Applications page, from Applications, choose the application you want to deploy. Then, choose Deploy web experience.
-
On the Deploy web experience page, for Service access, choose to Create a use a new service role or Use an existing service role. If you choose to create a new service role, Amazon Q Business, will automatically create a name for it.
-
In the Configure your Identity provider section, do the following:
-
Copy the Assertion consumer service(ACS) URL displayed on the console to a text editor of your choice
-
Copy the Audience URI (SP EntityID) displayed on the console to a text editor of your choice.
You will use this information later in this procedure.
-
-
Then, switch to the Entra ID portal. In the left navigation pane, choose Enterprise applications, and then choose Add.
-
On the All applications page, choose New application.
-
In the Browse Microsoft Entra Gallery page, choose Create your own application.
-
Enter a name for your application, choose Integrate any other application you don't find in the gallery (Non gallery), and choose Create. It might take a few minutes for your application to be provisioned.
-
On the Application overview page, in the Getting started section, choose Set up single sign on.
-
In the Select a single sign-on method pane, choose SAML.
-
In the Basic SAML Configuration section, choose More (three dots) and then choose Edit.
-
Choose Add identifier. Then enter the following information:
-
For the Identifier (Entity ID) field, enter the Audience URI (SP Entity ID) that you copied from the Amazon Q Business console.
-
Next, choose Add reply URL.
-
For the Reply URL (Assertion Consumer Service URL) field, enter the Application consumer service (ACS) URL that you copied from the Amazon Q Business console.
-
Leave the rest of the fields blank. Choose Save.
-
-
On the Set up single sign-on with SAML page, scroll down to the SAML Certificates section. Download the Federation Metadata XML file and save it in your local drive.
-
In the Attributes & Claims section, choose More (three dots) and then choose Edit.
-
In the Attributes & Claims page, choose Unique User Identifier (Name ID).
-
In the Manage claim page, expand Choose name identifier format. For the Name identifier format field, select Unspecified. Choose Save.
-
In the Attributes & Claims page, choose Add new claim.
-
For the Name field, enter
Email
. -
Expand Choose name format.
-
For the Name format field, select Unspecified.
-
Make sure that the Source is set to Attribute.
-
For the Source attribute field, choose the drop-down arrow and select user.mail.
-
Choose Save.
-
-
Go back to your application page. In the left navigation pane of your application page, choose Users and groups.
-
In the Users table, select the user that you created earlier. To finish assigning users, choose Assign. Continue with the next steps.
-
If you do not see the user you want to add to your application, choose + Add user/group.
-
In the Add Assignment page, choose None Selected.
-
In the right pane, select the user or search for the user in the search bar and then select the user.
-
Choose Select and then choose Assign.
-
-
In the Users and groups page, choose the user name. On the user page, verify that the User principal name and Identities fields are populated.
-
Go back to the Amazon Q Business console, and make sure you're on the Deploy web experience page.
-
Scroll down to the Provide metadata from your IdP section. To upload the metadata XML file that you saved in your previous steps, choose Import from XML.
-
In the Configure user and group mapping section, do the following:
-
For Email attribute of SAML assertion – Enter the attribute name that you provided in the Entra ID console. For example, Email could be an attribute name.
Note
Make sure there are no spaces at the end of
Email
. -
For User group field attribute of SAML assertion - optional – Enter an optional user group attribute.
-
-
Choose Deploy.
-
Once deployment finishes, a URL should appear on your Amazon Q Business application page under Deployed URL.
-
Choose the URL to open your Amazon Q Business web experience and enter credentials for a user that has access to the web experience.
If you encounter HTTP status code 403 (Forbidden) errors , see Troubleshooting Amazon Q Business and identity provider integration.