AWS Machine Learning Blog 09月04日
Amazon Q Business 引入 TTI 认证,简化 ISV 数据访问
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Amazon Q Business 现已支持 ISV(独立软件供应商)作为数据访问者,通过引入可信令牌签发者 (TTI) 认证,大幅简化了集成流程并提升了安全性。TTI 允许 ISV 使用其自身的 OpenID Provider 进行用户认证,无需用户进行二次验证,同时也保持了企业级安全标准。本文详细介绍了 TTI 的工作原理、数据访问者的概念,并提供了 ISV 和企业实施 TTI 认证的步骤和对比。此举旨在为 ISV 提供更顺畅的集成体验,同时确保客户数据的安全和隐私。

🌟 **TTI 认证简化 ISV 集成流程**:Amazon Q Business 引入了可信令牌签发者 (TTI) 认证,允许独立软件供应商 (ISV) 使用其现有的 OpenID Provider (OIDC) 对企业用户进行身份验证。这消除了用户在 ISV 应用程序和 Amazon Q 之间进行双重认证的需要,提供了更流畅的用户体验,同时通过 ISV 的身份提供商确保了安全。

🛡️ **增强的数据访问安全**:TTI 认证通过将用户身份信息传递到 AWS IAM 角色会话中,使 AWS 服务能够根据用户的实际身份和组成员身份做出授权决策。这允许对 Amazon Q 索引实施精细的访问控制,确保只有经过授权的用户才能访问特定数据,并维护了组织内的安全治理。

🧩 **数据访问者角色与注册**:数据访问者是已在 AWS 注册并被授权访问客户 Amazon Q 索引的 ISV。ISV 在注册时需提供显示名称、业务 Logo 和 OIDC 配置(包括 ClientId 和发现端点 URL),以及用于客户隔离的 tenantId。客户随后将 ISV 添加为数据访问者,授予其访问权限, ISV 便能通过 API 请求安全地查询客户的索引。

⚖️ **TTI 与授权码流程对比**:TTI 认证的优势在于一次性认证和支持后端访问,但 ISV 需要自行维护 OIDC 服务器。授权码流程则需要用户每会话启动,并涉及双重认证,但对 ISV 的基础设施要求较低。选择哪种方式取决于 ISV 的具体需求和企业客户的安全偏好。

🚀 **实施步骤与资源**:文章提供了 ISV 成为数据访问者和企业启用 TTI 认证的详细步骤。ISV 需要准备 OIDC 配置信息(例如从 Amazon Cognito 获取),而企业管理员则需要在 Amazon Q 控制台中创建 TTI 并设置数据访问者。AWS 提供了全面的文档和支持以协助完成集成。

Since its general availability in 2024, Amazon Q Business (Amazon Q) has enabled independent software vendors (ISVs) to enhance their Software as a Service (SaaS) solutions through secure access to customers’ enterprise data by becoming Amazon Q Business data accessor. To find out more on data accessor, see this page. The data accessor now supports trusted identity propagation. With trusted token issuer (TTI) authorization support, ISVs as data accessor can integrate with Amazon Q index while maintaining enterprise-grade security standards for their software-as-a-service (SaaS) solutions.

Prior to TTI support, data accessors needed to implement authorization code flow with AWS IAM Identity Center integration when accessing the Amazon Q index. With TTI support for data accessors, ISVs can now use their own OpenID Provider to authenticate enterprise users, alleviating the need for double authentication while maintaining security standards.

In this blog post, we show you how to implement TTI authorization for data accessors, compare authentication options, and provide step-by-step guidance for both ISVs and enterprises.

Prerequisites

Before you begin, make sure you have the following requirements:

Solution Overview

This solution demonstrates how to implement TTI authentication for Amazon Q Business data accessors. The following diagram illustrates the overall flow between different resources, from ISV becoming a data accessor, customer enabling ISV data accessor, to ISV accessing customer’s Amazon Q index:

Understanding Trusted Token Issuer Authentication

Trusted Token Issuer represents an advanced identity integration capability for Amazon Q. At its core, TTI is a token exchange API that propagates identity information into IAM role sessions, enabling AWS services to make authorization decisions based on the actual end user’s identity and group memberships. This mechanism allows AWS services to apply authorization and security controls based on the authenticated user context. The TTI support simplifies the identity integration process while maintaining robust security standards, making it possible for organizations to ensure that access to Amazon Q respects user-level permissions and group memberships. This enables fine-grained access control and maintains proper security governance within Amazon Q implementations.

Trusted Token Issuer authentication simplifies the identity integration process for Amazon Q by enabling the propagation of user identity information into AWS IAM role sessions. Each token exchange allows AWS services to make authorization decisions based on the authenticated user’s identity and group memberships. The TTI support streamlines the integration process while maintaining robust security standards, enabling organizations to implement appropriate access controls within their Amazon Q implementations.

Understanding Data Accessors

A data accessor is an ISV that has registered with AWS and is authorized to use their customers’ Amazon Q index for the ISV’s Large Language Model (LLM) solution. The process begins with ISV registration, where they provide configuration information including display name, business logo, and OpenID Connect (OIDC) configuration details for TTI support.

During ISV registration, providers must specify their tenantId configuration – a unique identifier for their application tenant. This identifier might be known by different names in various applications (such as Workspace ID in Slack or Domain ID in Asana) and is required for proper customer isolation in multi-tenant environments.

Amazon Q customers then add the ISV as a data accessor to their environment, granting access to their Amazon Q index based on specific permissions and data source selections. Once authorized, the ISV can query the customers’ index through API requests using their TTI authentication flow, creating a secure and controlled pathway for accessing customer data.

Implementing TTI Authentication for Amazon Q index Access

This section explains how to implement TTI authentication for accessing the Amazon Q index. The implementation involves initial setup by the customer and subsequent authentication flow implemented by data accessors for user access.

TTI provides capabilities that enable identity-enhanced IAM role sessions through Trusted Identity Propagation (TIP), allowing AWS services to make authorization decisions based on authenticated user identities and group memberships. Here’s how it works:

To enable data accessor access to a customer’s Amazon Q index through TTI, customers must perform an initial one-time setup by adding a data accessor on Amazon Q Business application. During setup, a TTI with the data accessor’s identity provider information is created in the customer’s AWS IAM Identity Center, allowing the data accessor’s identity provider to authenticate access to the customer’s Amazon Q index.

The process to set up an ISV data accessor with TTI authentication consists of the following steps:

    The customer’s IT administrator accesses their Amazon Q Business application and creates a trusted token issuer with the ISV’s OAuth information. This returns a TrustedTokenIssuer (TTI) Amazon Resource Name (ARN).
    The IT administrator creates an ISV data accessor with the TTI ARN received in Step 1. Amazon Q Business confirms the provided TTI ARN with AWS IAM Identity Center and creates a data accessor application. Upon successful creation of the ISV data accessor, the IT administrator receives data accessor details to share with the ISV. The IT administrator provides these details to the ISV application.

Once the data accessor setup is complete in the customer’s Amazon Q environment, users can access the Amazon Q index through the ISV application by authenticating only against the data accessor’s identity provider.

The authentication flow proceeds as follows:

    A user authenticates against the data accessor’s identity provider through the ISV application. The ISV application receives an ID token for that user, generated from the ISV’s identity provider with the same client ID registered on their data accessor. The ISV application needs to use the AWS Identity and Access Management (IAM) role that they created during the data accessor onboarding process by calling AssumeRole API, then make CreateTokenWithIAM API request to the customer’s AWS IAM Identity Center with the ID token. AWS IAM Identity Center validates the ID token with the ISV’s identity provider and returns an IAM Identity Center token. The ISV application requests an AssumeRole API with: IAM Identity Center token, extracted identity context, and tenantId. The tenantId is a security control jointly established between the ISV and their customer, with the customer maintaining control over how it’s used in their trust relationships. This combination facilitates secure access to the correct customer environment. The ISV application calls the SearchRelevantContent API with the session credentials and receives relevant content from the customer’s Amazon Q index.

Choosing between TTI and Authorization Code

When implementing Amazon Q integration, ISVs need to consider two approaches, each with its own benefits and considerations:

Trusted Token Issuer Authorization Code
Advantages Single authentication on the ISV system Enhanced security through mandatory user initiation for each session
Enables backend-only access to SearchRelevantContent API without user interaction
Considerations Some enterprises may prefer authentication flows that require explicit user consent for each session, providing additional control over API access timing and duration Requires double authentication on the ISV system
Requires ISVs to host and maintain OpenID Provider

TTI excels in providing a seamless user experience through single authentication on the ISV system and enables backend-only implementations for SearchRelevantContent API access without requiring direct user interaction. However, this approach requires ISVs to maintain their own OIDC authorization server, which may present implementation challenges for some organizations. Additionally, some enterprises might have concerns about ISVs having persistent ability to make API requests on behalf of their users without explicit per-session authorization.

Next Steps

For ISVs: Becoming a Data Accessor with TTI Authentication

Getting started on Amazon Q data accessor registration process with TTI authentication is straightforward. If you already have an OIDC compatible authorization server for your application’s authentication, you’re most of the way there.

To begin the registration process, you’ll need to provide the following information:

For details, see Information to be provided to the Amazon Q Business team.

For ISVs using Amazon Cognito as their OIDC authorization server, here’s how to retrieve the required OIDC configuration details:

    To get the OIDC ClientId:- Navigate to the Amazon Cognito console- Select your User Pool- Go to “Applications” > “App clients”- The ClientId is listed under “Client ID” for your app client To get the discovery endpoint URL:- The URL follows this format:https://cognito-idp.{region}.amazonaws.com/{userPoolId}/.well-known/openid-configuration– Replace {region} with your AWS region (e.g., us-east-1)- Replace {userPoolId} with your Cognito User Pool IDFor example, if your User Pool is in us-east-1 with ID ‘us-east-1_abcd1234’, your discovery endpoint URL would be:

    https://cognito-idp.us-east-1.amazonaws.com/us-east-1_abcd1234/.well-known/openid-configuration

Note: While this example uses Amazon Cognito, the process will vary depending on your OIDC provider. Common providers like Auth0, Okta, or custom implementations will have their own methods for accessing these configuration details.

Once registered, you can enhance your generative AI application with the powerful capabilities of Amazon Q, allowing your customers to access their enterprise knowledge base through your familiar interface. AWS provides comprehensive documentation and support to help you implement the authentication flow and API integration efficiently.

For Enterprises: Enabling TTI-authenticated Data Accessor

To enable a TTI-authenticated data accessor, your IT administrator needs to complete the following steps in the Amazon Q console:

    Create a trusted token issuer using the ISV’s OAuth information Set up the data accessor with the generated TTI ARN Configure appropriate data source access permissions

This streamlined setup allows your users to access Amazon Q index through the ISV’s application using their existing ISV application credentials, alleviating the need for multiple logins while maintaining security controls over your enterprise data.

Both ISVs and enterprises benefit from AWS’s comprehensive documentation and support throughout the implementation process, facilitating a smooth and secure integration experience.

Clean up resources

To avoid unused resources, follow these steps if you no longer need the data accessor:

Conclusion

The introduction of Trusted Token Issuer (TTI) authentication for Amazon Q data accessors marks a significant advancement in how ISVs integrate with Amazon Q Business. By enabling data accessors to use their existing OIDC infrastructure, we’ve alleviated the need for double authentication while maintaining enterprise-grade security standards through TTI’s robust tenant isolation mechanisms and secure multi-tenant access controls, making sure each customer’s data remains protected within their dedicated environment. This streamlined approach not only enhances the end-user experience but also simplifies the integration process for ISVs building generative AI solutions.

In this post, we showed how to implement TTI authentication for Amazon Q data accessors. We covered the setup process for both ISVs and enterprises and demonstrated how TTI authentication simplifies the user experience while maintaining security standards.

To learn more about Amazon Q Business and data accessor integration, refer to Share your enterprise data with data accessors using Amazon Q index and Information to be provided to the Amazon Q Business team. You can also contact your AWS account team for personalized guidance. Visit the Amazon Q Business console to begin using these enhanced authentication capabilities today.


About the Authors

Takeshi Kobayashi is a Senior AI/ML Solutions Architect within the Amazon Q Business team, responsible for developing advanced AI/ML solutions for enterprise customers. With over 14 years of experience at Amazon in AWS, AI/ML, and technology, Takeshi is dedicated to leveraging generative AI and AWS services to build innovative solutions that address customer needs. Based in Seattle, WA, Takeshi is passionate about pushing the boundaries of artificial intelligence and machine learning technologies.

Siddhant Gupta is a Software Development Manager on the Amazon Q team based in Seattle, WA. He is driving innovation and development in cutting-edge AI-powered solutions.

Akhilesh Amara is a Software Development Engineer on the Amazon Q team based in Seattle, WA. He is contributing to the development and enhancement of intelligent and innovative AI tools.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Amazon Q Business TTI认证 数据访问者 ISV集成 OIDC 身份验证 企业安全 Amazon Q SaaS TTI Authentication Data Accessor ISV Integration OIDC Authentication Enterprise Security SaaS
相关文章