Before you begin, make sure you have an Admin account (Viewer or Contributor) and access to the AWS SSO console with permissions to manage applications.
Step 1: Configure SAML 2.0 for Abstract in AWS.
- Add the Abstract application from the AWS SSO application catalog.
- Upon adding the Abstract app, AWS generates integration instructions unique for each customer, which includes the Metadata URL and Entity ID for that customer.
- Locate and record your Metadata URL and Entity ID.
Step 2: Set up SAML single sign-on in Abstract.
- Open the Abstract app (desktop or web).
- In the left side pane, click on the organization name.
- From the dropdown, select Organization Settings.
- Select the Permissions tab.
- In the Configure SSO section, enter the Metadata URL and Entity ID you recorded from AWS.
- Enter any manual exceptions you might have. Emails listed in the manual exceptions section will bypass SSO and be able to log in with email and password.
- Note: You’ll need to use primary email addresses in the manual exceptions list. SSO activation will fail if the email you list is a user’s secondary email. If that happens, you’ll see an error message with the primary email for the failing account. Add that primary email to the manual exceptions list after you’ve verified you know the user.
- Click Test with my Account.
- Note: You may see an error message if one or more users are in multiple Abstract Organizations. You’ll need to ask those users to either leave their other Organizations or create a new account with their company email.
- Toggle Activate SSO on.
- Click Save Changes.