The AWS integration configures 1Kosmos as a SAML 2.0 identity provider for both AWS IAM Identity Center (multi-account organizations) and direct AWS IAM federation (single-account deployments), mapping users to appropriate IAM roles or permission sets.

Integration type

SSO

Added

Overview

The AWS integration configures 1Kosmos as a SAML 2.0 identity provider for both AWS IAM Identity Center (multi-account organizations) and direct AWS IAM federation (single-account deployments), mapping users to appropriate IAM roles or permission sets.

For organizations using AWS IAM Identity Center, 1Kosmos is configured as the external identity provider. Users navigate to the AWS access portal, are redirected to 1Kosmos for biometric authentication, and are returned to the portal with access to their assigned accounts and roles. For direct IAM SAML federation, 1Kosmos acts as the IdP and AWS IAM roles are configured to trust assertions from 1Kosmos, with role ARNs passed in the SAML assertion.

The 1Kosmos mobile app supports Touch ID, Face ID, and liveness-checked LiveID. Users must enroll their biometrics before the integration is tested.


Prerequisites

  • Active 1Kosmos tenant: Community administrator access to the AdminX portal. Contact 1kosmos.com/contact if not yet provisioned.

  • AWS administrator access: IAM administrative rights, including the ability to create identity providers, configure IAM Identity Center, and modify IAM role trust policies.

  • AWS IAM Identity Center enabled (for multi-account deployments): IAM Identity Center must be enabled in your AWS Organization management account before configuring an external identity provider.

  • 1Kosmos IdP metadata or certificate: The 1Kosmos SAML metadata XML or signing certificate is required by AWS to establish trust. Collect this from AdminX before beginning the AWS-side configuration.

  • 1Kosmos mobile app installed: Users must have the app on iOS or Android with biometrics enrolled before testing.


Configuration values

Values to collect from 1Kosmos AdminX (IdP) for AWS:

Field

Where to find it

IdP SAML Metadata URL

AdminX → Settings → IdP Configuration → Metadata URL

IdP Entity ID (Issuer)

AdminX → Settings → IdP Configuration → Core Configuration

SSO URL (PassiveLogOnUri)

AdminX → Settings → IdP Configuration → Single SignOn Service URL

Signing Certificate (PEM)

AdminX → Settings → IdP Configuration → View Certificate → Public Key

Values to collect from AWS after creating the IdP (for AdminX configuration):

Field

Description

AWS Access Portal URL

IAM Identity Center → Settings → Identity source → AWS access portal URL

ACS URL

IAM Identity Center → Settings → Identity source → ACS URL for SAML

AWS IAM Identity Center Issuer URL

IAM Identity Center → Settings → Identity source → Issuer URL

IAM Identity Provider ARN (for direct IAM)

IAM → Identity Providers → [your provider] → ARN


Integration steps

Step 1: Collect IdP metadata from AdminX

  • Log in to the AdminX portal and navigate to Settings → IdP Configuration.

  • Copy the Metadata URL. AWS can import IdP metadata directly from a URL, which is the simplest approach.

  • Alternatively, download the metadata XML file or copy the signing certificate PEM if your AWS environment does not support metadata URL import.

Step 2: Configure 1Kosmos as the external identity provider in AWS IAM Identity Center

  • Log in to the AWS Management Console and navigate to IAM Identity Center.

  • Select Settings from the left menu and click Change identity source under the Identity source section.

  • Select External identity provider and click Next.

  • Under IdP SAML metadata, click Choose file and upload the metadata XML from AdminX, or paste the metadata URL if the field accepts URLs.

  • AWS will display the IAM Identity Center ACS URL and Issuer URL. Copy these values for use in AdminX.

  • Click Next and confirm the change. Note that changing the identity source will affect all users currently assigned to AWS accounts.

Step 3: Add AWS as a SAML application in AdminX

  • In the AdminX portal, navigate to Applications → Add Application.

  • Scroll to Custom App, select SAML 2.0 Generic, and click Add integration.

  • Enter "AWS IAM Identity Center" as the Application Name, set Instance to Production, and enter the AWS Access Portal URL as the Application Access URL. Click Next.

  • Set the NameID Format to urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress and NameID Value to email.

  • Add claims mappings for email (Username), firstname (first_name), and lastname (last_name). Click Next.

  • Enter the AWS IAM Identity Center Issuer URL as the Entity ID and the ACS URL as the Assertion Consumer Service URL with Method set to POST.

  • Enable Assertion signing and click Save.

Step 4: Assign users and permission sets in AWS

  • In IAM Identity Center, navigate to Users and create or sync your user accounts. Email addresses must match between 1Kosmos and AWS.

  • Navigate to AWS accounts, select the accounts you want to grant access to, and assign the appropriate permission sets to user groups or individual users.

Step 5: Test the integration

  • Navigate to the AWS Access Portal URL in a browser.

  • Enter a test user's email. You will be redirected to the 1Kosmos AdminX login screen.

  • Open the 1Kosmos mobile app, scan the QR code, and complete biometric authentication.

  • Confirm you are returned to the AWS Access Portal and that the correct accounts and roles are displayed for the user.

  • Test with a single user before enabling for all organization users. Keep a direct IAM admin account accessible as a fallback during rollout.


Attribute mappings

Source (1Kosmos)

Target (AWS)

Description

user.email

NameID (emailAddress)

Must match the username in IAM Identity Center

user.firstName

first_name

User first name

user.lastName

last_name

User last name

Integration notes

Changing the IAM Identity Center identity source to an external provider affects all users currently using the default AWS identity source. Plan the migration carefully and communicate the change to users before switching.

For organizations using AWS Organizations with multiple accounts, IAM Identity Center is the recommended integration path since it provides centralized access management across all accounts.

For single-account deployments using direct IAM SAML federation, create an IAM identity provider using the 1Kosmos metadata and then update the trust relationship policy on each role to reference the 1Kosmos provider ARN and include the required SAML condition keys.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.