Configure ADFS as a SAML provider in AWS IAM by uploading ADFS metadata and creating trusting IAM roles.
In ADFS, add AWS as a relying party, define claim rules to map AD groups to AWS role ARNs.
Authentication
A user authenticates via ADFS using AD credentials.
ADFS retrieves group memberships and issues a SAML assertion
Role assumption
The assertion is sent to AWS STS which grants temporary credentials for assuming a role in a target AWS account (e.g., a development account managed by Control Tower)
Non-IAM user access the AWS resource by assuming IAM Role attached with token
Access Management
IAM Identity Center lists available roles/accounts.
Control Tower's guardrails (e.g., SCPs) restrict actions across the organization while account-specific IAM policies control resource access
Multiple-Account Navigation
Users can switch roles/accounts via the AWS Management Console, but only assume one role at a time.