2 Answers
- Newest
- Most votes
- Most comments
0
I created a new saml provider in IAM and everything works now.
answered a year ago
0
Hello,
I hope you're doing well.
Thank you for reaching out to us with your concern.
I understand that you want to use Appstream 2.0 using the existing identity provider. When tried assuming the role, users facing access denied error. Hence you reached out to us for assistance.
Unfortunately, I am unable to fully answer this question without additional context. Basically I need to have saml response to identify the exisiting setup. Hence, I would request you to create a Support ticket. Where we can have a more visibility to dive deep into your exisiting structure and can provide you the resolution.
answered a year ago
Relevant content
- asked 2 years ago
- Accepted Answerasked 4 years ago
- asked 8 months ago
- asked 9 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 2 years ago
Thank you for responding. If I had access to paid support I wouldn't be using re:Post though.
I think I might have been confused in my original post. I believe there is a restriction of having one SAML provider linked to SSO in "IAM Identity Center" which isn't a problem. But you are allowed more than one SAML Identity Provider in "Identity and Access Management (IAM)" ? If this is the case I just need to create a new SAML provider there and link it with the Role and Application.