CloudBeaver Documentation

DOWNLOAD pdf

AWS OpenID database access via Okta

Note: This feature is available in Enterprise, AWS and Team editions only.

Overview

CloudBeaver allows for database connections through AWS OpenID with Okta authentication. This guide details the process for establishing such connections. Please ensure you meet all the prerequisites outlined below before proceeding with the configuration steps.

Prerequisites

  • AWS OpenID Configuration: An active configuration of AWS OpenID is necessary. This includes a properly set up AWS account with OpenID Connect enabled. Additionally, ensure the account has the required permissions to create and manage identity providers and roles.
  • Okta setup: Access an Okta account with the necessary permissions to configure applications.
  • CloudBeaver administrative access: Ensure administrative privileges in CloudBeaver.

Configuration steps

  1. Create an Application in Okta:

  1. Add Identity Provider in AWS IAM:

Hints for AWS IAM Identity Provider configuration: >- Provider URL: Use your Okta domain, for example, your-domain.okta.com/. >- Audience: Enter Okta's client ID, which can be copied from the application created in Okta.

  1. Configure a Role for Web Identity in AWS:

  1. Log in to CloudBeaver as an Administrator.
  1. Enable AWS Services and AWS OpenID Provider:
    • Navigate to Settings -> Administration -> Server Configuration and select the checkboxes for both AWS and AWS OpenID.
  1. Configure Identity Provider

    • Continue to Settings -> Administration -> Identity Providers.
    • Click on the + Add button to begin configuring a new identity provider.

    Below is the table with fields to be completed for configuring the identity provider:

Field Description
Provider Select AWS OpenID from the dropdown menu.
ID Enter a custom name for the identity provider.
Configuration name Specify the configuration name.
Description (optional) Provide a brief description of the identity provider.
Icon URL (optional) Enter the URL of an icon to represent this identity provider in CloudBeaver.
Client ID Use the Client ID from the Okta application.
Client Secret Use the Client Secret from the Okta application.
IDP auth endpoint URL Format as https://{okta_domain}/oauth2/v1/authorize.
IDP token endpoint URL Format as https://{okta_domain}/oauth2/v1/token.
Role ARN Enter the ARN for the WebIdentity role from AWS.

> Important: The Role ARN added during this step acts as the default role. It's not advisable to use an > administrator role at this step. It is recommended to use a role with minimum privileges during provider setup. >

After the provider is configured, you will see an AWS Role ARN field for each user, where > you can specify a role with higher privileges, if necessary.

  • After filling in the fields, click on the Create button to complete the identity provider configuration.
  1. Copy Redirect and Sign out Links:

    1. Enter the newly created identity provider.
    2. Copy the Redirect link and the Sign out link.

  2. Update Redirect URIs in Okta:

    1. In your Okta application, navigate to General -> Login.
    2. Under Sign-in redirect URIs, paste the copied Redirect link.
    3. In the same section, locate Sign-out redirect URIs and paste the Sign out link there.
    4. Click Save in Okta to finalize these configurations.

  1. Now you can log in through the newly created Federated authentication method in CloudBeaver, using the Configuration name you assigned during the setup.

  1. Verify the Integration of AWS OpenID and Okta

    1. Once logged in, click on your username in CloudBeaver and navigate to the User Info tab.
    2. Here, you should see two tokens. Their presence indicates that the integration of AWS OpenID and Okta has been successfully completed, and CloudBeaver has access to the necessary credentials.

  2. Following successful login, you can access the databases listed in Cloud Explorer that are integrated with your AWS account.

Did we resolve your issue?