Use IAM Identity Center (AWS SSO) to Protect your CloudFront

September 29, 2022

Using CloudFront to distribute your web application is a good practice; by leveraging caching at the Edge, you ensure that your visitors will get the lowest latency possible.

But what if you had a pre-release of your application that isn’t for the whole world to see, but you still want to provide the same experience as you will in production? CloudFront doesn’t propose a solution out-of-the-box for this.

Lambda@Edge or CloudFront-Functions

Luckily, CloudFront has ways to act on requests by using either Lambda@Edge or CloudFront-Functions.

Several solutions already exist leveraging these services to add different types of password protection or user authentication on CloudFront:

Using SAML Authentication with existing IAM Identity Center

You might have set up your AWS Accounts using Control Tower with Organizations and are managing your members using IAM Identity Center, the successor to AWS Single-Sign-On. Or you might use AWS Identity Center as a standalone tool to centralize your SSO credentials for 3rd party applications.

The Solution:

The application is the SAML Service Provider (SP), and IAM Identity Center is the SAML Identity Provider (IdP).

  1. For each request, the SP validates the encrypted authorization cookie using a Lambda@Edge function in the viewer-request event.
  2. If the Cookie isn’t valid:
                   a. The Lambda@Edge function will create an Authorization Request and redirect the browser to the relevant IdP Endpoint.
                   b. The IdP provides the user with a login page.
                   c. Upon successful login, the IdP generates a SAML Assertion Document and redirects the browser to the SP ACS Endpoint.
                   d. The SP validates the assertion, sets an encrypted authorization cookie in the browser, and redirects the browser to the
                        originally requested URL.
  3. If the Cookie is valid:
                    a. The content is either served from the cache or retrieved from the origin.

Add an Application to the IAM Identity Center

For this, we assume you already have IAM Identity Center setup, perhaps already with some groups and users.

  • Open the AWS Console
  • Open IAM Identity Center
  • On the left menu, expand “Application assignments” and click on “Applications
  • Click on the “Add application” button on the right
  • Choose “Add custom SAML 2.0 application” and click on the “Next” button
  • Enter a user-friendly Display Name
  • enter a user-friendly Description
  • Download the IAM Identity center SAML metadata file, you will need it to configure the solution
  • Leave Application start URL and Relay state empty
  • Enter dummy values for the Application ACS URL and the Application SAML audience, we will come back to configure this later
  • Click on the “Submit” button
  • Open your application settings
  • On the “Action” drop-down top right, choose “Edit Attribute Mappings
  • Enter the name of your project (this value isn’t used but needs to be filled)
  • Set the Format to transient
  • Click on the button “Save changes

The Code: CloudFront and S3 Hosted Website

This solution is deployed using serverless.com:

  • It creates a CloudFront distribution
  • It creates an S3 Bucket
  • It creates an SSL Certificate in ACM
  • It creates an Entry in Route53
  • It creates 3 Lambda@Edge functions:
      1. Protect
    :
            -Attached as viewer-request to the default CloudFront Behavior
           -Invoked on each request to validate the cookie and redirect the browser to the IdP if needed
      2. acs
    :
            -Attached as viewer-request to the /saml/acs path
            -Invoked with POST by the browser with the SAML Assertion Document
      3. metadata
    :
            -Attached as viewer-request to the /saml/metadata.xml path
            -Allows to retrieve the SP metadata document to configure the IdP
  • It uses one NPM module:
            -samlify

Prerequisites

AWS IAM Roles

Your account needs to have 2 IAM Roles set up to allow deploying StackSets for the bucket that is in another region:

  • AWSCloudFormationStackSetAdministratorRole
  • AWSCloudFormationStackSetExecutionRole
  
AWSTemplateFormatVersion: 2010-09-09
Description: Configure the AWSCloudFormationStackSet Roles to enable use of AWS CloudFormation StackSets.

Resources:
  AdministrationRole:
    Type: AWS::IAM::Role
    Properties:
      RoleName: AWSCloudFormationStackSetAdministrationRole
      AssumeRolePolicyDocument:
        Version: 2012-10-17
        Statement:
          - Effect: Allow
            Principal:
              Service: cloudformation.amazonaws.com
            Action:
              - sts:AssumeRole
      Path: /
      Policies:
        - PolicyName: AssumeRole-AWSCloudFormationStackSetExecutionRole
          PolicyDocument:
            Version: 2012-10-17
            Statement:
              - Effect: Allow
                Action:
                  - sts:AssumeRole
                Resource:
                  - "arn:*:iam::*:role/AWSCloudFormationStackSetExecutionRole"
  ExecutionRole:
    Type: AWS::IAM::Role
    Properties:
      RoleName: AWSCloudFormationStackSetExecutionRole
      AssumeRolePolicyDocument:
        Version: 2012-10-17
        Statement:
          - Effect: Allow
            Principal:
              AWS:
                - !Sub arn:aws:iam::${AWS::AccountId}:root
            Action:
              - sts:AssumeRole
      Path: /
      ManagedPolicyArns:
        - !Sub arn:${AWS::Partition}:iam::aws:policy/AdministratorAccess
  

Domain

  • Your domain needs to be hosted in Route53
  • You need to retrieve the HostedZoneId

Development tools

Some tools are needed; install them if you don’t already have them:

  • npm i -g serverless
  • nvm

Get The Source

  
git clone https://github.com/DanielMuller/Cloudfront-Auth-IAM-Identity-Center
cd Cloudfront-Auth-IAM-Identity-Center
npm i
  

Edit serverless.yml and change the following settings:

  • service
  • custom.domainName: This is the domain for your CloudFront distribution
  • custom.hostedZoneId: The Route53 HostedZoneId for your domain
  • custom.bucketRegion: The region you want your S3 Bucket to be created in
  • custom.sourceToken: Any string, protects direct access to your bucket
  • custom.origin.DomainName: Remove .${self:custom.bucketRegion} if your bucket is in us-east-1
  • provider.deploymentBucket.name: Set your deployment bucket name
  • The region needs to be set to us-east-1, Lambda@Edge functions can only be deployed to this region

Create src/secrets/main.ts:

  
export const secrets = {
  initVector: '1234567890123456', // change me to any 16 Bytes string
  privateKey: '12345678901234567890123456789012', // change me to any 32 Bytes string
  audience: 'audience string', // change me to my application name
  idpMetadata: `XML content of IdP metadata.xml downloaded earlier`
};
  

Replace WantAuthnRequestsSigned="true" with WantAuthnRequestsSigned="false" in the IdP metadata if it is present.

Deploy It

  
sls deploy
  

Configure Your Application in IAM Identity Center

  • Download your SP metadata.xml by visiting https://yourdomain.example.com/saml/metadata.xml
  • Open the previously created Custom SAML Application in IAM Identity Center
  • On the “Action” drop-down top right, choose “Edit Configuration
  • Upload your metadata.xml in the “Application metadata” section
  • Add users or groups to your application

Add Some Files to Your Bucket

  
echo 'Index' > index.html
echo "Page1" > page1.html
echo "Page2" > page2.html
echo "404" > 404.html
echo "403" > 403.html
# Replace ${DomainName} with your bucket name (same as domain name)
aws s3 cp --cache-control max-age=31536000 index.html s3://${domainName}/index.html
aws s3 cp --cache-control max-age=31536000 page1.html s3://${domainName}/page.html
aws s3 cp --cache-control max-age=31536000 page2.html s3://${domainName}/page2/index.html
aws s3 cp --cache-control max-age=31536000 404.html s3://${domainName}/404.html
aws s3 cp --cache-control max-age=31536000 403.html s3://${domainName}/403.html
rm *.html
  

What Did We Achieve?

  • Access to your distribution requires an authentication
  • SP initiated and IdP initiated login to your site
  • Direct access to your bucket is blocked
  • All visitors share the same cached content

Test it Out

  1. Open http://domainName.s3 − website.{aws_region}.amazonaws.com/page.html: You receive an Access denied
  2. Open https://${domainName}/page.html: You will be redirected to the IAM Identity Center login page and back to your site where the page will display
  3. Clear your cookies
  4. Open your IAM Identity Center start page and log-in
  5. Select your application and click on it. You will be redirected to your site and already logged in
  6. Open https://${domainName}/page2. You will see the content of page2/index.html
  7. Open https://${domainName}/anything. You will see your 404 page

Why Lambda@Edge & Not CloudFront Functions?

  • CloudFront Functions doesn’t have access to the request body. IAM Identity Center will issue a POST request to the ACS endpoint with the payload in the body.
  • CloudFront Functions can’t include modules and has some limitations on what Javascript functions can be used

Conclusion

Serving your website using CloudFront is the perfect way to ensure low latency for all your visitors. You want to use the same technology in development as in production, but you want the next version of your application to be a surprise to your members.

You want to allow only certain members of your organization to have access to the next version.

To achieve this, we added an additional layer to CloudFront by protecting all access with a login wall and thus keeping unwanted eyes away from our future release. By adding this to CloudFront (which is our Network Stack), we didn't need to alter our application's code in any way, keeping it identical for development and production.

By leveraging the Identity Provider already used to grant access to AWS resources, we don't have to manage a separate IdP and still have the fine-grained capability of picking which members of the Organization can access our application. No need to send passwords via email and rotate them when we want to revoke access, as it would have been needed with HTTP's Basic Authentication.

We can as easily revoke access by simply removing the user from the relevant group.

Dance like nobody is watching; protect like everyone is.

We hope that you have now all your development work behind a login wall; if you need more information, you can contact the author at:
daniel.muller@serverlessguru.com

About the Author

Daniel Muller - Senior Serverless Developer at ServerlessGuru

Daniel Muller has been an AWS and (mainly) a Serverless enthusiast for many years. When not banging on a keyboard, he is online playing games with friends or outside, enjoying life with his family.

Access free book

The dream team

At Serverless Guru, we're a collective of proactive solution finders. We prioritize genuineness, forward-thinking vision, and above all, we commit to diligently serving our members each and every day.

See open positions

Looking for skilled architects & developers?

Join businesses around the globe that trust our services. Let's start your serverless journey. Get in touch today!
Ryan Jones
Founder
Speak to a Guru
Edu Marcos
Chief Technology Officer
Speak to a Guru
Mason Toberny
Head of Enterprise Accounts
Speak to a Guru

Join the Community

Gather, share, and learn about AWS and serverless with enthusiasts worldwide in our open and free community.