How to Configure AWS - SAML Single Sign-On to Access Fyno
How to Configure AWS - SAML Single Sign-On to Access Fyno
How to Configure AWS - SAML Single Sign-On to Access Fyno
With this example, you will learn how to configure SAML-based Single Sign-On (SSO) between AWS IAM Identity Center and Fyno.
This walkthrough explains the end-to-end setup, what each step accomplishes, and how centralized access management improves security and reduces operational overhead.
With SAML SSO:
Before starting, ensure the following:
In this step, you will create an application in AWS that represents Fyno.
This section defines how AWS and Fyno communicate during authentication.
IMPORTANT: Only assigned users will be able to authenticate.
To establish secure communication:
To upload the metadata file in Fyno, contact support@fyno.io.
Fyno will use this to verify signed SAML assertions.
Metadata and sign-in URLs vary depending on your AWS region (e.g.,
ap-south-1,us-east-1).
AWS must send user identity attributes inside the SAML assertion.
Navigate to:
IAM Identity Center → Applications → Fyno → Attribute mappings.
Fyno identifies users using the email value sent in the tenantId attribute.
If access is revoked in AWS, users will automatically lose access to Fyno.
Users must launch Fyno from the AWS Access Portal (IdP-initiated login).
SP-initiated login may be enabled depending on configuration.
Do not configure Relay State or Start URL unless instructed by Fyno.
Session duration (default 12 hours) is controlled by AWS IAM Identity Center.
Logging out of Fyno does not log out the AWS SSO session.
Metadata and login URLs vary based on region and tenant.