Unable to sync users that were previously created manually #73
-
Hi, before deploying the idp-scim-sync service, I had created two users manually. After deleting the group these two users were originally members of, the SSO login page was unavailable for these two users. I believe I have removed all possible references to these accounts (in permission sets etc) and created a new group in Google Workspace with only these two users as owners. However, importing the users to AWS SSO is failing with the following message: Is it possible to address this, or do I need to delete all users and redo the configuration from scratch? Thanks! |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 6 replies
-
Hi @tmylonidis sorry to hear that. Could you provide more evidence:
I tested this scenario and it is working in the last version, so let me understand better from the log.
NOTE: If the users (email) and groups (name) you have provisioned previously to the first sync doesn't are similar to the news coming from the sync (filter), these users will disappear! |
Beta Was this translation helpful? Give feedback.
-
Hi @christiangda, thank you for your response. Please allow me to provide some additional information. Once AWS SSO was enabled using Google Workspace as the IdP, automatic provisioning was NOT enabled. I manually created 2 users in AWS SSO, and on the Google Admin's side I had these two users in a group, and only that group was granted access to the AWS SSO app. After enabling automatic provisioning and deploying your solution, things were working as expected. However, when I manually deleted the two users I had originally created, alongside with their respective Google Workspace group, even though these two users were part of other Google Workspace groups, they were not created again in AWS SSO. So we are stuck in an intermediate phase where these two users are granted access from a Google Workspace perspective, but they don't exist in AWS SSO. I noticed that the state file stored in the S3 bucket, which the lambda is syncing from, still contains these two users with a proper SCIM id, even after I manually deleted them from AWS SSO. Another "weird" issue is that renaming groups in Google Workspace can mess things up. For example, we have a group called "AWS Ownership" and the filter configured is "name:AWS*". After renaming this group to "Root AWS Account", the app is still trying to fetch its users for some reason. Can it be because it still exists in the state.json file as well? Shouldn't that be deleted? The version we are using is 0.0.12. I have attached some logs, only two group names are visible, but this is fine, they are being used just for testing purposes. Do you think that manually editing the state.json file could solve the issue? Ideally we would like to avoid "hacking" solutions, the changes in Google Workspace should be reflected in AWS SSO. Thanks! |
Beta Was this translation helpful? Give feedback.
-
Hi @tmylonidis let me try to help you. From your previous answer:
I'm confused here, I mean why do you want to When you touch the
Having said that:
Short answer: No, you shouldn't. I have never tried this case before because I am confident in the Google Workspace Documentation -> Search for groups, The Also, to be sure about the filter before moving this to the Last Comment About your LOG: Looks like This could happen when you Delete and Create again the group in the AWS SSO side manually after the first sync. why? If the first time the groups were created with the Let me know if this answer helps you! |
Beta Was this translation helpful? Give feedback.
Hi @christiangda, thank you for your response. Please allow me to provide some additional information. Once AWS SSO was enabled using Google Workspace as the IdP, automatic provisioning was NOT enabled. I manually created 2 users in AWS SSO, and on the Google Admin's side I had these two users in a group, and only that group was granted access to the AWS SSO app.
After enabling automatic provisioning and deploying your solution, things were working as expected. However, when I manually deleted the two users I had originally created, alongside with their respective Google Workspace group, even though these two users were part of other Google Workspace groups, they were not created again in…