Configure AWS for UserLock SSO

Connect AWS logins to UserLock Single Sign-On (SSO) to centralize authentication, enforce corporate access policies, and simplify user access to AWS resources.

Published September 26, 2025

Introduction

This guide explains how to integrate Amazon Web Services (AWS) with UserLock Single Sign-On (SSO) using the SAML 2.0 protocol.

Once configured, AWS logins are authenticated by UserLock against Active Directory. This provides a seamless sign-in experience and allows administrators to enforce UserLock access policies (MFA, time, machine, or location restrictions) on AWS sessions.

🚩️ Before starting:

  • You need an AWS Organization account and a test user account available in AWS.

  • UserLock SSO must already be installed and configured.

Step 1. Configure AWS for Single Sign-On

  1. Go to UserLock console▸ ⚙️ Server Settings▸ Single Sign-On

  2. Click on Download ▸ Metadata file.

  3. Open the AWS console.

  4. Enable AWS SSO.

  5. In Settings, change the Identity Source to External Identity Provider.

  6. Under Identity Provider metadata, upload the UserLock metadata file previously download.

  7. In the AWS accounts section, select your AWS account and click Assign Users.

    • Add the test user account.

  8. Launch the User portal URL (available in AWS SSO Settings) to verify that the integration works.

Note

💡 Best practice: start with a single test user before rolling out to production.

Step 2. Configure AWS in UserLock console

  1. In the UserLock console, go to ⚙️ Server settings ▸ SSO.

  2. Click on the AWS row.

  3. Fill in the fields with information from the AWS SSO console:


    Settings

    Values

    Email domain

    The domain used by your AWS users (e.g. contoso.com).

    Issuer

    Copy / paste AWS SSO issuer URL from the AWS SSO console

    ACS URL

    Copy / paste AWS SSO ACS URL from the AWS SSO console


Renew the SAML certificate

When the SAML certificate expires in UserLock, you must update AWS with the new metadata.

  1. In the AWS SSO console, go to Settings.

  2. In Identity Source, click Change.

  3. Enter the new UserLock SSO metadata URL in the IdP SAML metadata field: https://<your_ul_sso_url>/metadata

Troubleshooting

For common issues, see Troubleshooting SSO.
If the problem persists, please contact IS Decisions Support.

Next steps

You can extend the security of SSO sessions by applying UserLock access policies in addition to authentication.