AWS Single Sign-On (AWS SSO) Integration Guide for SAP Cloud Platform Cloud Foundry


This document helps you configure AWS SSO to facilitate single sign-on (SSO) for SAP Cloud Platform Cloud Foundry using SAML.



You’ll need the following to set up SSO access to SAP Cloud Platform Cloud Foundry:

Setup instructions

  1. On the Configure page, in the Details section, fill in the Display name and the Description(optional) of the application.


We suggest that you choose a unique display name if you plan to have more than one of the same application.

  1. Login to SAP Cloud Platform Cockit as an Administrator.

  2. Choose Cloud Foundry.

  3. Click on Subaccounts, then choose your account.

  4. Click on Security, then choose Trust Configuration.

  5. Click on New Trust Configuration.

  6. Download AWS SSO Metadata file and import into SAP Cloud Platform by clicking on Upload. Then choose Parse.

  1. Insert these values, then click on Save.
Field Value
Description AWS SSO
Status Active
Show SAML Login Link on Login Page checked
Link Text AWS SSO
Create Shadow Users During Login checked
  1. Get tenant name and region in your SAP Cloud Platform Cloud Foundry account.

  2. Download the SAP Cloud Platform Cloud Foundry metadata file from the URL below. Replace the tenantname and region with your account information.

  1. Go back to the AWS SSO console page where you are configuring the Application.

  2. Under Application metadata, choose Browse and select the Metadata downloaded in step 10.

  3. Choose Save Changes.

  4. Assign a user to the application in AWS SSO.


Use the following sections to verify the SSO integration.


Ensure that the user performing the verification is logged out of both AWS SSO and the application before performing the steps in each section.

Verifying Service Provider Initiated SSO from SAP Cloud Platform Cloud Foundry

  1. Access the SAP Cloud Platform Cloud Foundry Application URL.

  2. On the AWS SSO user portal, type the credentials of a user assigned to the application in the AWS SSO user portal.

  3. Choose Sign In.

  4. On the SAP Cloud Platform Cloud Foundry Application home page, verify that both SAP Cloud Platform Cloud Foundry Application and AWS SSO are logged in with the same user.


If sign in was not successful, please see the troubleshooting steps.


Error Issue Solution
Other When AWS SSO creates a SAML Assertion for a user, it uses the value of the 'email' field (if they are present) from the connected directory to populate the 'Email' in the SAML assertion. Many service providers expect these attributes to contain the user’s email address. By default your directory is configured to send 'windowsUPN' in both fields. Your directory may be configured to contain the users email in the 'Email' attribute instead. If so, you may need to change this in your Connected directory settings.

For general troubleshooting problems, please refer to Troubleshooting Guide.

User Provisioning Types

There are two user provisioning you need to aware of: