Skip to content
Bisman.
Navigate
External
ProjectsProjects
Bisman.
Home›Knowledge Base›How-To Integrate AWS IAM Identity Center with Okta SSO
MOPbegineerSecurity

How-To Integrate AWS IAM Identity Center with Okta SSO

Step-by-step MOP to configure Okta as the external IdP for AWS IAM Identity Center with SCIM provisioning, group-based RBAC, and account-permission assignments.

Table of Contents

  • Overview
  • Prerequisites
  • Steps
    • Step 1: Enable IAM Identity Center and switch identity source
    • Step 2: Create Okta integration for AWS IAM Identity Center
    • Step 3: Populate SAML endpoints in Okta
    • Step 4: Provide IdP metadata to AWS
    • Step 5: Enable SCIM provisioning
    • Step 6: Assign users and groups in Okta
    • Step 7: Push groups from Okta to AWS
    • Step 8: Create permission sets in AWS
    • Step 9: Assign groups to accounts and permission sets
    • Step 10: Validate SSO (console and CLI)
  • Troubleshooting

Overview

This guide explains how to integrate Okta (IdP) with AWS IAM Identity Center (formerly AWS SSO) to centralize identity and enable SSO for console/CLI across multiple AWS accounts, using group‑based permission sets and least‑privilege access.

Prerequisites

Tools & Services

  • AWS account with IAM Identity Center enabled
  • Okta tenant with admin access
  • AWS Organizations enabled for multi-account access (recommended)

Access & Permissions

  • Okta Administrator role (to create app integration, enable SCIM, manage groups)
  • AWS permissions in the management account to configure IAM Identity Center and assignments

Example AWS policy used during setup (scoped as needed):

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "IdentityCenterSetup",
      "Effect": "Allow",
      "Action": [
        "organizations:*",
        "sso-directory:*",
        "sso:*",
        "iam:GetRole",
        "iam:UpdateAssumeRolePolicy",
        "iam:CreateRole",
        "iam:DeleteRole",
        "iam:AttachRolePolicy",
        "iam:PutRolePolicy",
        "iam:DetachRolePolicy",
        "iam:CreateServiceLinkedRole",
        "iam:DeleteRolePolicy",
        "iam:ListAttachedRolePolicies",
        "iam:ListRolePolicies",
        "iam:GetSAMLProvider",
        "ds:UnauthorizeApplication",
        "ds:DescribeDirectories",
        "ds:AuthorizeApplication"
      ],
      "Resource": "*"
    }
  ]
}

Steps

Step 1: Enable IAM Identity Center and switch identity source

  1. In AWS console, open IAM Identity Center.
  2. If not enabled, select Enable.
  3. Go to Settings → Identity source → Actions → Change identity source → External identity provider → Next.
Enable IAM Identity Center

Step 2: Create Okta integration for AWS IAM Identity Center

  1. In Okta Admin, Applications → Browse App Catalog → search “AWS IAM Identity Center”.
Okta Applications section
  1. ToaAdd the integration select the AWS IAM IDENTITY CENTER from the catalog, proceed to integrate it with OKTA.
Add AWS IAM Identity Center integration in Okta
  1. Give the integration a recognizable label/name.
Provide application label in Okta

Step 3: Populate SAML endpoints in Okta

  1. In Okta app → Sign On → Edit settings.
Edit Sign On settings in Okta
  1. From AWS IAM Identity Center Settings, copy:
    • Assertion Consumer Service (ACS) URL
    • Identity Center Issuer URL
Copy ACS and Issuer from AWS
  1. Paste these into the Okta fields for AWS SSO ACS URL and AWS SSO Issuer URL.
Okta fields for AWS SSO ACS and Issuer

Step 4: Provide IdP metadata to AWS

  1. In Okta SAML Signing Certificates, download the certificate.
Download certificate and view IdP metadata in Okta
  1. View IdP metadata and copy:
    • EntityID → use as IdP Issuer URL

    • SingleSignOnService Location → use as IdP sign-in URL

IdP metadata content in Okta
  1. In AWS IAM Identity Center → Identity provider metadata, paste the two URLs and upload the Okta certificate. Save.
Paste IdP metadata in AWS

Step 5: Enable SCIM provisioning

  1. In AWS IAM Identity Center → Settings → Automatic provisioning → Enable. Copy the SCIM endpoint and access token.
Automatic provisioning in AWS SCIM endpoint and token in AWS
  1. In Okta app → Provisioning:
    • Base URL = SCIM endpoint
    • API Token = access token
    • Test the API credentials, then Save.
Test API credentials in Okta
  1. Enable Create Users, Update User Attributes, and Deactivate Users.
Manage users in Okta

Step 6: Assign users and groups in Okta

  1. Okta → Assignments: add users and/or groups to the AWS app.
Assign users to AWS app in Okta
  1. Confirm users appear in AWS IAM Identity Center → Users.
Users appear in AWS

Step 7: Push groups from Okta to AWS

  1. Create the user group on Okta
Create group in Okta
  1. After creating the group select that group and add/assign people in the particular group. (If Group(s) already exists then Skip this Step)
Add people to group in Okta
  1. Go to the Application that was created for the integration and navigate to the Assignments sections. Select the group from the filters and then assign the group whose users require access.
Assign groups to AWS app in Okta

Use Group Push in Okta:

  • Option A: Push specific groups by name
Group push by names
  • Option B: Define rules (starts with / ends with / contains) to push matching groups automatically
Group push via rules
  1. After saving the configuration for pushing the Groups Based on Names or Using the Rule to identify the Groups to be pushed, the Groups will be pushed to AWS, if new users are added/removed then the changes will also be reflected in real-time on AWS.
Synchronization confirmation

Step 8: Create permission sets in AWS

  1. IAM Identity Center → Multi-account permissions → Permission sets → Create.
Create permission set in AWS
  1. Choose predefined (AdministratorAccess, ReadOnlyAccess, PowerUserAccess) or define custom least‑privilege sets.
Predefined permission sets

Step 9: Assign groups to accounts and permission sets

  1. IAM Identity Center → AWS accounts → Assign users or groups.
Assign groups to AWS accounts
  1. Select group(s), choose target account(s), and attach appropriate permission set(s).
Attach permission set to group and account
  1. Submit; reprovisioning applies assignments.

Step 10: Validate SSO (console and CLI)

  1. End user signs into Okta, clicks the AWS tile → redirected to AWS account/role chooser.
Redirection to AWS Accessing AWS with granted privileges
  1. For CLI, configure aws sso login profiles against the same Identity Center instance and test role access.

Troubleshooting

  • Access denied: Verify group assignment to the correct account and permission set; check propagation.
  • Login loops or metadata errors: Re-check ACS/Issuer URL mapping and Okta certificate upload.
  • SCIM sync not working: Re-test API credentials; rotate token if expired; verify Group Push configuration.
  • Group present but no roles: Ensure the group is assigned to accounts with at least one permission set.

Tags

AWSOktaIAM Identity CenterSSOSCIMRBAC
← Back to Knowledge BaseNeed Help? Contact Me →

© 2026 Bisman Singh. Built with passion for DevOps and automation.

Navigation

  • Home
  • About
  • Publications
  • Contact

About Sections

  • Experience
  • Tooling
  • Certifications
  • Education

Resources

  • Case Studies
  • Technical Guides