Hanzo
PlatformHanzo IAMConnecting to IAMSAML

AWS Client VPN (SAML)

Use Hanzo IAM as SAML IdP for AWS Client VPN.

This guide configures Hanzo IAM as a SAML identity provider for AWS Client VPN.

Prerequisites

Configure the SAML application in Hanzo IAM

  • Set Redirect URL to urn:amazon:webservices:clientvpn.

saml_aws_redirect_url.png

  • Set SAML reply URL to http://127.0.0.1:35001.

saml_aws_reply_url.png

  • Save the SAML metadata as an XML file for the next step.

saml_aws_metadata.png

Configure AWS

Add Hanzo IAM as an identity provider

  1. In the IAM console, open Identity providersCreate provider.
  2. Choose SAML, give the provider a name, and upload the metadata file from Hanzo IAM.
  3. Click Next stepCreate.

saml_aws_create.png saml_aws_choose_metadata.png

Create a Client VPN endpoint

  1. In VPCClient VPN EndpointsCreate Client VPN Endpoint.
  2. Set Client IPv4 CIDR for remote users.
  3. Select your Server certificate (from ACM).
  4. Under Authentication, choose User-based authenticationFederated authentication.
  5. Select the SAML identity provider you created.
  6. Click Create Client VPN Endpoint.

saml_aws_vpn_endpoint.png saml_aws_create_vpn.png

Associate the VPN with a VPC

  1. In the endpoint, open Target network associationsAssociate target network.
  2. Select the VPC and subnet.

saml_aws_target_network.png

Authorization rules (optional)

  1. Open Authorization rulesAdd authorize rule.
  2. Set Destination network (e.g. 172.31.16.0/20 for your EC2).
  3. Under Grant access to, choose Allow access to users in a specific access group and enter the group name (e.g. iam).
  4. Add the rule.

saml_aws_rule.png

Connect to Client VPN

  1. Select the endpoint (state: Available) → Download Client Configuration.
  2. In the AWS Client VPN app: FileManage ProfilesAdd Profile → select the downloaded file.
  3. Select the profile and click Connect.

saml_aws_download.png

How is this guide?

Last updated on

On this page