-
aNavigate to Azure Portal — Enterprise Applications
Sign in to the Azure Portal and open Azure Active Directory. From the left-hand navigation panel, select Enterprise Applications.
-
bCreate a Non-Gallery Application
Click + New application, choose Non-gallery application, name it (e.g. "AWS SSO"), then click Add.
-
cConfigure SAML Single Sign-On
Open the new application and select Single sign-on → SAML. Configure the Identifier (Entity ID) and Reply URL using the values provided by AWS IAM Identity Center.
-
dDownload & Upload Federation Metadata
Download the Federation Metadata XML from the SAML Signing Certificate section in Azure. In the AWS IAM Identity Center console, navigate to Settings → Identity source → Change, select External IdP, and upload the XML metadata file.
-
eAccept & Complete Identity Source Setup
Review the configuration in AWS, type
ACCEPTin the confirmation field, and click Change identity source to complete the AWS SSO side of the federation.
mailNickname attribute is mapped as the source identifier. Username and email attributes are aligned between Azure AD and AWS SSO schemas.-
1Enable Provisioning in Azure AD
In the Enterprise Application, go to Provisioning → Get started. Set Provisioning Mode to Automatic.
-
2Enter SCIM Credentials from AWS
In AWS IAM Identity Center, go to Settings → Automatic provisioning → Enable. Copy the SCIM endpoint URL and Access token (OAuth bearer token). Paste both into the Azure AD Provisioning credentials fields.
-
3Configure Attribute Mapping
Under Mappings, edit the mailNickname attribute. Set the source attribute to match your organization's username convention. Click Save.
-
4Turn Provisioning On
Set Provisioning Status to On, then click Save. Azure AD will begin syncing assigned users and groups to AWS SSO on the next provisioning cycle.
Information Required to Generate a Token
- Full SELECT, INSERT, UPDATE, DELETE
- Schema modification privileges
- For engineers with write access
- Use only when writes are needed
- SELECT queries only
- No data modification
- For analysts, on-call triage
- Default / least-privilege mode
# Step 1 — Log in to AWS via SSO (browser-based) aws sso login --profile <your-sso-profile> # Step 2 — Generate a temporary DB authentication token aws rds generate-db-auth-token \ --hostname <db-host> \ --port <port> \ --region <aws-region> \ --username <db-username-rw-or-ro> \ --profile <your-sso-profile>
Required Parameters
Gather all 4 values before opening your DB client
rds-ca-bundle.pem) for your region.
Connecting via DBeaver
-
1Create New Connection
Open DBeaver → Database → New Database Connection. Select your DB type (PostgreSQL, MySQL, etc.).
-
2Fill Host & Credentials
Enter the Host and Port. Set Username to the RW or RO user. Paste the generated token as the Password.
-
3Configure SSL
Go to the SSL tab in the connection settings. Enable SSL and set the CA Certificate to the
rds-ca-bundle.pemfile you downloaded. -
4Test & Connect
Click Test Connection. If successful, click Finish. Remember: tokens expire after 15 minutes — reconnect using a fresh token if needed.
psql / mysql CLI with the --ssl-ca flag. The token is always used as the password field.
- ✓Azure AD enterprise app created and SAML configured
- ✓Federation metadata XML uploaded to AWS Identity Center
- ✓SCIM provisioning enabled — users synced to AWS SSO
- ✓AWS SSO profile configured locally (
~/.aws/config) - ✓Logged in via
aws sso login --profile ... - ✓Token generated — valid for 15 min
- ✓RDS CA certificate downloaded from AWS console
- ✓DB host name and correct username (RW / RO) confirmed
- ✓SSL enabled in DB client with CA certificate
- ✓Token used as password — reconnect with fresh token on expiry