How AWS Establishes Trust with an OIDC Provider

1
2
3
AWS
AWS
No Trust Relationship
Exchanging Information
Configuring Trust
Defining Permissions
Trust Established!
OIDC
OIDC Provider

Initial State: No Trust

AWS and the OIDC provider don't have a trust relationship yet.

Technical Details

AWS doesn't recognize tokens issued by this OIDC provider. Any authentication attempts would be rejected.

1. Exchange Public Information

AWS and the OIDC provider exchange necessary public information.

Technical Details

The OIDC provider shares its issuer URL and public signing keys. AWS shares its client ID and redirect URIs.

2. Configure Trust Parameters

AWS configures the OIDC provider as a trusted identity provider.

Technical Details

AWS creates an IAM Identity Provider resource with the OIDC issuer URL and client ID thumbprint. It defines which token claims to use for identity mapping.

3. Define Access Permissions

AWS defines what authenticated users from this provider can access.

Technical Details

AWS creates IAM roles with trust policies that specify which authenticated users from the OIDC provider can assume the role, and what permissions those roles have.

Trust Established!

Users can now authenticate via the OIDC provider to access AWS resources.

Technical Details

Users authenticate with the OIDC provider, receive a token, and present it to AWS. AWS validates the token with the provider's public keys and grants access based on the token claims.

Summary

The trust relationship is now established. AWS will accept identity tokens from the OIDC provider, verify them, and grant access based on the token claims and defined IAM roles.

This completes the "trust establishment" phase. Now users can authenticate with the OIDC provider and use their identity to access AWS resources.