
qqxb8 (qqxb8) asked a question.
Dear community,
We've got a similar issue as
… where a session timeout for the AWS App isn't configurable.
But the SessionDuration has to be set on the call from Okta to AWS.
So it has to be configurable on Okta side
We've followed the integration guide:
In the App settings, there is no parameter for SessionDuration, which could be set.
The request from Okta to AWS looks something like:
LUUAEYQ%22%2C%22sessionKey%22%3A%22tpSl9thxr2PkEXAMPLETAnVLVGdwC5zXtGDr
%2FqWi%22%2C%22sessionToken%22%3A%22AQoDYXdz%EXAMPLE&SessionDuration=43200
… where the SessionDuration needs to be configurable, so that we can extend this beyond the default one hour (and set this to our desirable 12 hours instead).
Just to clarify upfront: We're NOT using AWS SSO but the "AWS Multi-Account
Configuration".
The link to the 2016.46 release (https://developer.okta.com/docs/release-notes/2016/*platform-bugs-fixed-4) also doesn't seem to help much.
Has anybody figured this out yet? How to extend the session timeout?

We've opened a case with AWS support and they helped us finding the correct settings within Okta.
I hope this is gonna help others as well:
------>------>------>------> AWS Support answer below ------>------>------>------>
I would like to mention that when we federate into AWS account by using the Console URL constructed with AssumeRoleWithSAML API via your external IdP (Okta in your case), the session duration value is calculated based on the SessionDuration HTML parameter in the URL. By default, the session is valid for 1 hour[1]. However, you can customize the session duration using this Session Duration attribute. This value needs to be sent from your IdP in the SAML assertion during user authentication as below to set the session duration to customized value[2].
<Attribute Name="https://aws.amazon.com/SAML/Attributes/SessionDuration ">
<AttributeValue>7200</AttributeValue>
</Attribute>
This attribute can be configured in your AWS SAML application's page under your IdP. Please follow the below steps to configure the Session duration value in Okta.
1. Sign into your Okta Admin Console and navigate to your application's page.
2. Select the Sign On tab for the AWS Account Federation app, then choose 'Sign on' tab and click Edit.
3. Search for 'Session Duration' option under 'Advanced Sign-on Settings' and enter the required session duration value as per your requirement.
Note: The duration value is an integer representing the number of seconds for the session. The value can range from 900 seconds (15 minutes) to 43200 seconds (12 hours).
4. Click on Save to save your configuration.
After making the above changes, please try signing into your AWS account and check if the session is valid for the configured duration.
References:
=========
[1] Using IAM roles :
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use.html
[2] Configuring SAML assertions for the authentication response
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml_assertions.html#saml_role-session-duration