Creates an IAM entity to describe an identity provider (IdP) that supports OpenID Connect (OIDC).
iam_create_open_id_connect_provider(Url, ClientIDList, ThumbprintList)
[required] The URL of the identity provider. The URL must begin with
You cannot register the same provider multiple times in a single AWS account. If you try to submit a URL that has already been used for an OpenID Connect provider in the AWS account, you will get an error.
A list of client IDs (also known as audiences). When a mobile or web app
registers with an OpenID Connect provider, they establish a value that
identifies the application. (This is the value that\'s sent as the
You can register multiple client IDs with the same provider. For example, you might have multiple applications that use the same OIDC provider. You cannot register more than 100 client IDs with a single IAM OIDC provider.
There is no defined format for a client ID. The
[required] A list of server certificate thumbprints for the OpenID Connect (OIDC) identity provider\'s server certificates. Typically this list includes only one entry. However, IAM lets you have up to five thumbprints for an OIDC provider. This lets you maintain multiple thumbprints if the identity provider is rotating certificates.
The server certificate thumbprint is the hex-encoded SHA-1 hash value of the X.509 certificate used by the domain where the OpenID Connect provider makes its keys available. It is always a 40-character string.
You must provide at least one thumbprint when creating an IAM OIDC
provider. For example, assume that the OIDC provider is
For more information about obtaining the OIDC provider\'s thumbprint, see Obtaining the Thumbprint for an OpenID Connect Provider in the IAM User Guide.
The OIDC provider that you create with this operation can be used as a principal in a role\'s trust policy. Such a policy establishes a trust relationship between AWS and the OIDC provider.
When you create the IAM OIDC provider, you specify the following:
The URL of the OIDC identity provider (IdP) to trust
A list of client IDs (also known as audiences) that identify the application or applications that are allowed to authenticate using the OIDC provider
A list of thumbprints of the server certificate(s) that the IdP uses
You get all of this information from the OIDC IdP that you want to use to access AWS.
The trust for the OIDC provider is derived from the IAM provider that this operation creates. Therefore, it is best to limit access to the CreateOpenIDConnectProvider operation to highly privileged users.
1 2 3 4 5 6 7 8 9
1 2 3 4 5 6 7 8 9 10 11 12
# The following example defines a new OIDC provider in IAM with a client # ID of my-application-id and pointing at the server with a URL of # https://server.example.com. svc$create_open_id_connect_provider( ClientIDList = list( "my-application-id" ), ThumbprintList = list( "3768084dfb3d2b68b7897bf5f565da8efEXAMPLE" ), Url = "https://server.example.com" )
Add the following code to your website.
For more information on customizing the embed code, read Embedding Snippets.