\\
Amazon supports custom SAML 2.0 applications. See [Amazon: Set up your own SAML 2.0 application Link|https://docs.aws.amazon.com/singlesignon/latest/userguide/customermanagedapps-set-up-your-own-app-saml2.html]\\
----
⚠️ __Important__: Redirect of CrushFTP user to the SAML provider is not supported.\\
{{{
https://domain.com/?u=SSO_SAML&p=redirect
}}}\\
----
!1. Amazon SSO SAML 2.0 Configurations:
\\
Open the IAM Identity [Center Console Link|https://console.aws.amazon.com/singlesignon] and create a new __custom application__.\\
\\
[custom_app.png]\\
\\
Configure SAML Settings:\\
Enter the __Application Name__, __Application ACS URL__, and __SAML Audience__ in the provided fields.\\
Once all required values are set, click Submit to complete the application setup.\\
{{{
Application ACS URL example:
https://your.crushftp.com/?u=SSO_SAML&p=none
}}}\\
{{{
SAML Audience example:
https://your.crushftp.com/
}}}\\
\\
[custom_app_settings.png]\\ 
\\
Configure Attribute Mappings:\\
Set up the attribute mappings for your application to define which user details (such as username, email, or roles) are passed during the SAML authentication process.\\
These mappings ensure that the correct user information is shared between your identity provider and the application.\\
\\
[custom_app_attribute_mappings_edit.png]\\
\\
Add new attribute mapping.\\
{{{
Maps to this string value or user attribute in IAM Identity Center:
${user:subject}
}}}\\
[csutom_app_new_attribute.png]\\
\\
__Warning:__ Assign users/groups to the created application!\\
\\
[custom_app_assign_users.png]\\
\\
!2. SAMLSSO plugin configuration\\
\\
Download the __IAM Identity Center SAML metadata__ file.\\
{{{
[Amazon SSO SAML 2.0 Configuration]                                    [CrushFTP settings] 

entityID value of IAM Identity Center SAML metadata XML file        -> SAML Provider URL (EntityID)

Application SAML audience                                           -> SAML Audience

SingleSignOnService SAML:2.0:bindings:HTTP-POST Location value 
of IAM Identity Center SAML metadata XML file                       -> IDP Redirect URL (HTTP-POST)

IAM Identity Center SAML issuer URL                                 -> SAML Issuer

X509Certificate value of IAM Identity Center SAML metadata XML file -> Base64 encoded PEM Signing certificate
}}}
\\
On CrushFTP SAMLSSO plugin for "__Authentication type:__" set "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport".\\
\\
{{{
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
}}}\\
\\
[custom_app_crushftp_settings.png]\\
\\