
Setting Up Microsoft Entra ID SAML 2.0 Federation with Amazon WorkSpaces Pools
In this article, I’ll walk you through the process of setting up SAML 2.0 federation between Microsoft Entra ID (formerly Azure AD) and Amazon WorkSpaces Pools. This setup allows users to authenticate using their Microsoft Entra ID credentials, providing a seamless single sign-on (SSO) experience.






- Identifier (Entity ID): https://signin.aws.amazon.com/saml
- Reply URL (Assertion Consumer Service URL): https://signin.aws.amazon.com/saml
- Relay State (Optional): https://workspaces.euc-sso.us-east-1.aws.amazon.com/sso-idp?registrationCode=SLiad+G1234E#
- Select and delete all the additional claims

- Click on Add New Claim and create the attributes listed in the table

Name | Namespace | Source | Source Attribute |
---|---|---|---|
RoleSessionName | https://aws.amazon.com/SAML/Attributes | Attribute | user.userprincipalname |
PrincipalTag:Email | https://aws.amazon.com/SAML/Attributes | Attribute | user.mail |
Role | https://aws.amazon.com/SAML/Attributes | Attribute | arn:aws:iam::101234567890:role/EntraID-SAML-Federation,arn:aws:iam:: 101234567890:saml-provider/MicrosoftEntraID-IDP-WorkSpacesPool-UsEast |
SessionDuration | https://aws.amazon.com/SAML/Attributes | Attribute | 3600 |
- This is what the Attributes and Claims should show:










- <region-code> with the code of the AWS Region in which you created your WorkSpace Pool directory.
- <account-id> with the AWS account ID.
- <directory-id> with the ID of the directory you created earlier. You can get this in the WorkSpaces console.

- The policy should look similar to this example.






