Closed omerls-pw closed 1 year ago
The recommended deployment pattern is a lambda from the serverless application repository into the delegated administration account for IAM Identity Center.
I wanted to make sure that everything works before deploying to production.
What surprised me the most was that the users were synced using only SSOSYNC_SCIM_ACCESS_TOKEN
and SSOSYNC_SCIM_ENDPOINT
as identifiers, while Groups
weren't.
So at this time groups and group memberships are being created via the identityStore api, whilst users via the scim api.
Improving guidance in the attached fix.
Describe the bug One cannot execute
ssosync
when logged in to AWS withaws sso login
. It only works when usingAWS_ACCESS_KEY_ID
andAWS_SECRET_ACCESS_KEY
To Reproduce Steps to reproduce the behavior:
aws sso login
./ssosync -u user@domain.com -c ../credentials.json --log-level=debug -d --ignore-groups=$SSOSYNC_IGNORE_GROUPS -i $AWS_IDENTITY_STORE_ID -r $AWS_REGION
UnrecognizedClientException: The security token included in the request is invalid
Expected behavior work with both authentication methods.