AWS Cognito - OIDC - Configuration
Important Note
The instructions in this article cover a third-party app and may not reflect the latest version. Please use these instructions as a guide to complete the task, but be aware that some screens, field names, and steps may have changed.
Overview
This guide explains how to integrate AWS Cognito using OpenID Connect (OIDC) with Flosum Cloud Apps to enable Single Sign-On (SSO) for seamless login.
For more general instructions about adding an Identity Provider, see the following article.
Customer-Hosted
Customers who host Flosum Apps on their own infrastructure will have a custom URL for logging into their apps. When using this documentation, replace any Flosum Hosted URLs with your own URLs.
Outline Of Steps Involved
Create a User Pool with AWS Cognito
Determin Issuer URL
Obtain the Client ID and Client Secret
Set up the Redirect URL
Create an Identity Provider with Flosum Global Settings
Test the SSO
Configuring AWS Cognito for Flosum Cloud Apps
This section shows you how to configure an AWS Cognito User Pool to work with Flosum Cloud Apps for SSO.
Please note that the instructions for AWS Cognito may not reflect the latest version. Some screens, field names, and steps might have changed.
Create AWS Cognito User Pool
Access the AWS Management Console and navigate to the Cognito service.
Select Manage User Pools.
In the User Pools section, click the Create a User Pool button. You'll be prompted to name your new pool.
After naming your pool, select Step through settings. This section lets you define sign-in parameters for your users.
Select the attributes shown in the screenshot below. These attributes determine the information you'll collect from users during registration.
After setting the required attributes, click Next Step to save your configurations.
Configure App Client Settings
Navigate to App client settings and update them to match the configurations shown in the screenshot below.
In the CallBack URL(s) field, add the URL of your region for each Flosum Cloud App you want to use with SSO. See the table below for the URLs for your region.
Global Settings
https://global-us.flosum.app/api/v1/oauth/callback
Backup & Archive
https://backup-us.flosum.app/api/v1/oauth/callback
DevOps
https://devops-us.flosum.app/api/v1/oauth/callback
Global Settings
https://global-de.flosum.app/api/v1/oauth/callback
Backup & Archive
https://backup-de.flosum.app/api/v1/oauth/callback
DevOps
https://devops-de.flosum.app/api/v1/oauth/callback
Global Settings
https://global-jp.flosum.app/api/v1/oauth/callback
Backup & Archive
https://backup-jp.flosum.app/api/v1/oauth/callback
DevOps
https://devops-jp.flosum.app/api/v1/oauth/callback
Global Settings
https://global-au.flosum.app/api/v1/oauth/callback
Backup & Archive
https://backup-au.flosum.app/api/v1/oauth/callback
DevOps
https://devops-au.flosum.app/api/v1/oauth/callback
In the Sign-out URL(s) field, add the URL of your region for each Flosum Cloud App you want to use with SSO. See the table below for the URLs for your region.
Global Settings
https://global-us.flosum.app/api/v1/oauth/login
Backup & Archive
https://backup-us.flosum.app/api/v1/oauth/login
DevOps
https://devops-us.flosum.app/api/v1/oauth/login
Global Settings
https://global-de.flosum.app/api/v1/oauth/login
Backup & Archive
https://backup-de.flosum.app/api/v1/oauth/login
DevOps
https://devops-de.flosum.app/api/v1/oauth/login
Global Settings
https://global-jp.flosum.app/api/v1/oauth/login
Backup & Archive
https://backup-jp.flosum.app/api/v1/oauth/login
DevOps
https://devops-jp.flosum.app/api/v1/oauth/login
Global Settings
https://global-au.flosum.app/api/v1/oauth/login
Backup & Archive
https://backup-au.flosum.app/api/v1/oauth/login
DevOps
https://devops-au.flosum.app/api/v1/oauth/login
Retrieve the ISSUER_BASE_URL
You will need the ISSUER_BASE_URL value when creating the Identity Provider in Flosum Global Settings.
Navigate to Manage User Pools within AWS Cognito.
Select the User Pool you created, and then access General Settings.
Note the ISSUER_BASE_URL, which follows the format:
https://cognito-idp.<region>.amazonaws.com/<userPoolId>.
Retrieve ISSUER_CLIENT_ID and ISSUER_CLIENT_SECRET
You will need the ISSUER_CLIENT_ID and ISSUER_CLIENT_SECRET values when creating the Identity Provider in Flosum Global Settings.
Navigate to Manage User Pools within AWS Cognito.
Select the User Pool you created, and then click on App Clients.
Note the ISSUER_CLIENT_ID, found under App client id.
Note the ISSUER_CLIENT_SECRET, found under App client secret.
Set Redirect URL
In the Redirect URL field, add the URL of your region for each Flosum Cloud App you want to use with SSO. See the table below for the URLs for your region.
Global Settings
https://global-us.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-us.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-us.flosum.app/api/v1/auth/login/open-id
Global Settings
https://global-de.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-de.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-ed.flosum.app/api/v1/auth/login/open-id
Global Settings
https://global-jp.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-jp.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-jp.flosum.app/api/v1/auth/login/open-id
Global Settings
https://global-au.flosum.app/api/v1/auth/login/open-id
Backup & Archive
https://backup-au.flosum.app/api/v1/auth/login/open-id
DevOps
https://devops-au.flosum.app/api/v1/auth/login/open-id
Create Identity Provider In Global Settings
Create Identity Provider
Follow the general instructions in the article below to get started creating an OIDC Identity Provider.
Complete the Basic information section.
Select OPEN_ID for the identity provider Type.
Complete the Button information section.
(Optional) Complete the Group information section.
Complete OpenId Information Fields
Copy the information from your AWS Cognito application into the OpenId Information section. The table explains which AWS Cognito values to enter into which Flosum Fields. The final screenshot shows a completed identity provider for an AWS Cognito ODIC application.
The values in the AWS Cognito Value column are a combination of values from your AWS Cognito app. Retrieving these values is explained in the sections above.
Client ID
ISSUER_CLIENT_ID
Client Secret
ISSUER_CLIENT_SECRET
Issuer
ISSUER_BASE_URL

Save and Test
For instructions on logging in with SSO, see the following article.
Click Save to save the identity provider.
To test, open an incognito window.
Start logging in to Global Settings with your tenant name.
If the identity provider was configured successfully, you should see the SSO button you created.

Last updated
Was this helpful?