Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Login to your AWS account through the AWS Web console. The link http://signin.aws.cucloud.net will take you to your account.
  2. Now navigate to the IAM service dashboard and click on "Roles" in the left navigation. Alternatively, just clink on this link to get there: https://console.aws.amazon.com/iam/home?region=us-east-1#/roles
  3. Click on "Create New Role" button.
  4. Enter a named for the new role. The name must begin with the prefix "shib-" and contain no other hypens. E.g., "shib-example". Click "Next Step". 
    1. Image Modified
  5. For the next step, select "Role for Identity Provider Access" and then click on "Select" for "Grant Web Single Sign-On (WebSSO) access to SAML providers.
    1. Image Modified
  6. On the next screen, select "cornell_idp" for the value of "SAML provider" and click "Next Step".
    1. Image Modified
  7. The next step shows you the JSON policy document you just created. There is no need to alter it so click on "Next Step".
    1. Image Modified
  8. In the "Attach Policy" step, search for and select the existing policies you wish to assign to the new role. You can select AWS-managed policies, or custom policies that you created. You will be able to change the policies attached to the role later, so don't worry too much about getting this exactly right. You will also be able to add custom inline-policies to the role later as well. For this example, we selected the "SecurityAudit" AWS-managed policy. Click on "Next Step" when you are finished selecting policies. If you don't know exactly which policy to assign, you can skip this step and not assign any.
    1. Image Modified
  9. In the next step you have a chance to confirm the configuration. Click on "Create Role".

    1. Image Modified

Setup an AD Group for the New Role

...