Single Sign-On (SSO) for Amazon Connect using Okta can be deceptively tricky. While the individual components (Okta, IAM, SAML, and Amazon Connect) are all well-documented, the integration points between them are where most issues occur.
This guide walks through a working, end-to-end SAML 2.0 federation setup between Okta and Amazon Connect, including the IAM policies, roles, and Okta configuration required to avoid common “invalid SAML response” and sts:AssumeRoleWithSAML errors
This guide assumes:
Step 1: Identify Your Amazon Connect Instance ID
Example:
a65f1779-255a-4920-a5d2-2a3b0c674e75
You’ll use this ID multiple times throughout the setup.
Amazon Connect uses a federation token behind the scenes when users access the console via SAML. We must explicitly allow this.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "Statement1",
"Effect": "Allow",
"Action": "connect:GetFederationToken",
"Resource": [
"arn:aws:connect:<aws-region>:<account-id>:instance/<connect-instance-id>/user/${aws:userid}"
]
}
]
}
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "Statement1",
"Effect": "Allow",
"Action": "connect:GetFederationToken",
"Resource": [
"arn:aws:connect:us-east-1:2##########9:instance/a65f1779-255a-4920-a5d2-2a3b0c674e75/user/${aws:userid}"
]
}
]
}
WhyThis Matters
Without this permission, SAML login may succeed but the Amazon Connect console will fail to load.
In the Sign On tab:
Default Relay State
https://<region>.console.aws.amazon.com/connect/federate/<connect_id>
In Our example the value is:
https://us-east-1.console.aws.amazon.com/connect/federate/a65f1779-255a-4920-a5d2-2a3b0c674e75
You’ll use this to create the IAM SAML provider. Now Save your Okta application configuration.
arn:aws:iam::2##########9:saml-provider/OktaConnect
https://signin.aws.amazon.com/saml
OktaConnectFederationRole
Copy the role ARN:
arn:aws:iam::2##########9:role/OktaConnectFederationRole
Return to Okta → Application → Sign On → Edit
Identity Provider ARN (Required only for SAML SSO)
This must ultimately result in a SAML Role attribute that contains two ARNs:
role_arn, saml_provider_arn
Example:
arn:aws:iam::2##########9:role/OktaConnectFederationRole,
arn:aws:iam::2##########9:saml-provider/OktaConnect
NOTE: If only the IdP ARN is provided, AWS will return:
“Your request included an invalid SAML response”
/connect/federate/<connect-id>
3. Amazon Connect console should load without errors
|
Error |
Root Cause |
|
Invalid SAML response |
Role attribute missing role ARN |
|
sts:AssumeRoleWithSAML denied |
IAM role trust policy incorrect |
|
Connect console loads then fails |
Missing connect:GetFederationToken |
Amazon Connect SSO with Okta works extremely well once configured correctly, but it is sensitive to:
If you understand that AWS federation happens first, and Amazon Connect federation happens second, troubleshooting becomes much more straightforward.