AWS Cognito - Setting Up Identity Provider (SSO)
Overview
This guide explains how to integrate AWS Cognito with Flosum Cloud Apps to enable Single Sign-On (SSO) for seamless login.
For more general instructions about adding an Identity Provider, see the following article.
Customer-Hosted
Customers who host Flosum Apps on their own infrastructure will have a custom URL for logging into their apps. When using this documentation, replace any Flosum Hosted URLs with your own URLs.
Outline Of Steps Involved
Create a User Pool with AWS Cognito
Determin Issuer URL
Obtain the Client ID and Client Secret
Set up the Redirect URL
Create an Identity Provider with Flosum Global Settings
Test the SSO
Configuring AWS Cognito for Flosum Cloud Apps
This section shows you how to configure an AWS Cognito User Pool to work with Flosum Cloud Apps for SSO.
Please note that the instructions for AWS Cognito may not reflect the latest version. Some screens, field names, and steps might have changed.
Create AWS Cognito User Pool
Access the AWS Management Console and navigate to the Cognito service.
Select Manage User Pools.
In the User Pools section, click the Create a User Pool button. You'll be prompted to name your new pool.
After naming your pool, select Step through settings. This section lets you define sign-in parameters for your users.
Select the attributes shown in the screenshot below. These attributes determine the information you'll collect from users during registration.
After setting the required attributes, click Next Step to save your configurations.
Configure App Client Settings
Navigate to App client settings and update them to match the configurations shown in the screenshot below.
In the CallBack URL(s) field, add the URL of your region for each Flosum Cloud App you want to use with SSO. See the table below for the URLs for your region.
Global Settings
https://global-us.flosum.app/api/v1/oauth/callback
Backup & Archive
https://backup-us.flosum.app/api/v1/oauth/callback
DevOps
https://devops-us.flosum.app/api/v1/oauth/callback
Global Settings
https://global-de.flosum.app/api/v1/oauth/callback
Backup & Archive
https://backup-de.flosum.app/api/v1/oauth/callback
DevOps
https://devops-de.flosum.app/api/v1/oauth/callback
Global Settings
https://global-jp.flosum.app/api/v1/oauth/callback
Backup & Archive
https://backup-jp.flosum.app/api/v1/oauth/callback
DevOps
https://devops-jp.flosum.app/api/v1/oauth/callback
Global Settings
https://global-au.flosum.app/api/v1/oauth/callback
Backup & Archive
https://backup-au.flosum.app/api/v1/oauth/callback
DevOps
https://devops-au.flosum.app/api/v1/oauth/callback
In the Sign-out URL(s) field, add the URL of your region for each Flosum Cloud App you want to use with SSO. See the table below for the URLs for your region.
Global Settings
https://global-us.flosum.app/api/v1/oauth/login
Backup & Archive
https://backup-us.flosum.app/api/v1/oauth/login
DevOps
https://devops-us.flosum.app/api/v1/oauth/login
Global Settings
https://global-de.flosum.app/api/v1/oauth/login
Backup & Archive
https://backup-de.flosum.app/api/v1/oauth/login
DevOps
https://devops-de.flosum.app/api/v1/oauth/login
Global Settings
https://global-jp.flosum.app/api/v1/oauth/login
Backup & Archive
https://backup-jp.flosum.app/api/v1/oauth/login
DevOps
https://devops-jp.flosum.app/api/v1/oauth/login
Global Settings
https://global-au.flosum.app/api/v1/oauth/login
Backup & Archive
https://backup-au.flosum.app/api/v1/oauth/login
DevOps
https://devops-au.flosum.app/api/v1/oauth/login
Retrieve the ISSUER_BASE_URL
You will need the ISSUER_BASE_URL value when creating the Identity Provider in Flosum Global Settings.
Navigate to Manage User Pools within AWS Cognito.
Select the User Pool you created, and then access General Settings.
Note the ISSUER_BASE_URL, which follows the format:
https://cognito-idp.<region>.amazonaws.com/<userPoolId>.
Retrieve ISSUER_CLIENT_ID and ISSUER_CLIENT_SECRET
You will need the ISSUER_CLIENT_ID and ISSUER_CLIENT_SECRET values when creating the Identity Provider in Flosum Global Settings.
Navigate to Manage User Pools within AWS Cognito.
Select the User Pool you created, and then click on App Clients.
Note the ISSUER_CLIENT_ID, found under App client id.
Note the ISSUER_CLIENT_SECRET, found under App client secret.
Set Redirect URL
In the Redirect URL field, add the URL of your region for each Flosum Cloud App you want to use with SSO. See the table below for the URLs for your region.
Global Settings
https://global-us.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-us.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-us.flosum.app/api/v1/auth/login/open-id
Global Settings
https://global-de.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-de.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-ed.flosum.app/api/v1/auth/login/open-id
Global Settings
https://global-jp.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-jp.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-jp.flosum.app/api/v1/auth/login/open-id
Global Settings
https://global-au.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-au.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-au.flosum.app/api/v1/auth/login/open-id
Create Identity Provider In Global Settings
Create Identity Provider
Log in to Flosum Global Settings by following the instructions in the linked article.
For more general instructions about adding an Identity Provider, see the following article.
Click Identity Providers from the sidebar menu.
Click Create.

Enter a Name for the identity provider.
Click the Type dropdown menu.

Select OPEN_ID.

Enter the values you saved from your AWS Contigo User Pool into the following fields in the OpenId Information on the Create Identity Provider form.
ISSUER_CLIENT_ID
Client ID
ISSUER_CLIENT_SECRET
Client Secret
ISSUER_BASE_URL
Issuer
In the Button Text textbox, enter a label to be displayed on the login button on the login screen.
Click Save.

Log In to Flosum Cloud Apps Using AWS Contigo
After configuring AWS Contigo and adding the Identity Provider, test your SSO implementation by logging in to Flosum Global Settings.
No SSO Button
If the SSO button you created with the Identity Provider is missing from the tenant login screen, there may be an issue with the provider details. Verify that the Identity Provider configuration matches the SSO credentials.
Open the Flosum Cloud App to log in.
Click Use tenant name.

Enter Tenant Name.

Click the SSO button created by your system administrator.

This button may be labeled differently from the screenshot above. Ask your system administrator if you are unsure which button to click.
Complete the login with your SSO provider.
Last updated
Was this helpful?