Pular para o conteúdo principal

AWS Client VPN (SAML)

This guide configures Casdoor as a SAML identity provider for AWS Client VPN.

Pré-requisitos

Configure the SAML application in Casdoor

  • Set Redirect URL to urn:amazon:webservices:clientvpn.

saml_aws_redirect_url.png

  • Set SAML reply URL to http://127.0.0.1:35001.

saml_aws_reply_url.png

  • Save the SAML metadata as an XML file for the next step.

saml_aws_metadata.png

Configurar AWS

Add Casdoor as an identity provider

  1. In the IAM console, open Identity providersCreate provider.
  2. Choose SAML, give the provider a name, and upload the metadata file from Casdoor.
  3. Click Next stepCreate.

saml_aws_create.png saml_aws_choose_metadata.png

Create a Client VPN endpoint

  1. In VPCClient VPN EndpointsCreate Client VPN Endpoint.
  2. Set Client IPv4 CIDR for remote users.
  3. Select your Server certificate (from ACM).
  4. Under Authentication, choose User-based authenticationFederated authentication.
  5. Select the SAML identity provider you created.
  6. Clique em Criar Endpoint de VPN do Cliente.

saml_aws_vpn_endpoint.png saml_aws_create_vpn.png

Associate the VPN with a VPC

  1. In the endpoint, open Target network associationsAssociate target network.
  2. Select the VPC and subnet.

saml_aws_target_network.png

Authorization rules (optional)

  1. Open Authorization rulesAdd authorize rule.
  2. Set Destination network (e.g. 172.31.16.0/20 for your EC2).
  3. Under Grant access to, choose Allow access to users in a specific access group and enter the group name (e.g. casdoor).
  4. Add the rule.

saml_aws_rule.png

Conectar à VPN do Cliente

  1. Select the endpoint (state: Available) → Download Client Configuration.
  2. In the AWS Client VPN app: FileManage ProfilesAdd Profile → select the downloaded file.
  3. Select the profile and click Connect.

saml_aws_download.png