Towards AWS

Where Cloud Experts, Heroes, Builders, and Developers share their stories, experiences, and solutions.

Follow publication

AWS Verified Access for Accessing Internal Applications without VPN

--

In this post, I will explain how we can use AWS Verified Access to access an application without requiring a VPN.

Use Case

We have an internal application that runs on a private subnet and is accessible only through a VPN. We want to enable users to securely access this application from the internet without requiring a VPN.

Prerequisites

  • Enable the AWS IAM Identity Center in the AWS Region that you are working in.
  • An application running behind an internal load balancer.
  • Domain name

Steps

  1. Configure a trust provider
  2. Create a Verified Access instance
  3. Attach trust provider to the instance
  4. Create a Verified Access Group
  5. Create a Verified Access endpoint for the application
  6. Configure DNS
  7. Testing

Configure a Trust Provider

A trust provider is a service that provides information about users and devices. AWS Verified Access supports both AWS and third-party trust providers. In this example, we use “AWS IAM Identity Center” as the trust provider. Therefore, users created in the IAM Identity Center will be able to access the application.

resource "aws_verifiedaccess_trust_provider" "provider" {
description = "${var.app_name} trust provider"
policy_reference_name = var.policy_reference_name
trust_provider_type = "user"
user_trust_provider_type = "iam-identity-center"
tags = {
Name = "IAM"
}
}

policy_reference_name: We can refer to this when we write policies.

Create a Verified Access Instance

An AWS Verified Access instance is an AWS resource that manages the trust providers and Verified Access groups.

resource "aws_verifiedaccess_instance" "instance" {
description = "${var.app_name} instance"
tags = {
Name = var.app_name
}
}

Attach Trust Provider to the Instance

resource "aws_verifiedaccess_instance_trust_provider_attachment" "attachment" {
verifiedaccess_instance_id = aws_verifiedaccess_instance.instance.id
verifiedaccess_trust_provider_id = aws_verifiedaccess_trust_provider.provider.id
}

Create a Verified Access Group

An AWS Verified Access group is a collection of Verified Access endpoints and a group-level Verified Access policy. In this example, we use a simple policy that checks the format of an IAM user’s email address.

resource "aws_verifiedaccess_group" "group" {
verifiedaccess_instance_id = aws_verifiedaccess_instance.instance.id
policy_document = <<EOT
permit(principal, action, resource)
when {
context.IAM.user.email.address like "*@gmail.com"
};
EOT

tags = {
Name = var.app_name
}

depends_on = [
aws_verifiedaccess_instance_trust_provider_attachment.attachment
]
}

In context.IAM.user.email.address, IAM refers to the policy reference defined in step one.

Create a Verified Access Endpoint for the Application

A Verified Access endpoint is a regional resource that defines the application for which Verified Access grants access. In this example, AWS Verified Access grants access to an ECS application running behind an internal load balancer.

resource "aws_verifiedaccess_endpoint" "access_endpoint" {
description = "${var.app_name} access endpoint"
application_domain = var.application_domain

verified_access_group_id = aws_verifiedaccess_group.group.id

attachment_type = "vpc"
domain_certificate_arn = var.domain_certificate_arn
endpoint_domain_prefix = var.endpoint_domain_prefix
endpoint_type = "load-balancer"

load_balancer_options {
load_balancer_arn = var.load_balancer_arn
port = var.load_balancer_listener_port
protocol = var.load_balancer_listener_protocol
subnet_ids = var.subnet_ids
}

security_group_ids = var.security_group_ids

tags = {
Name = var.app_name
}
}

Configure DNS

In this step, we need to create a CNAME record to map our public domain name to the verified access domain. You can find the verified access domain name on the ‘Verified Access endpoints’ details page. Once you create the CNAME record, all requests to the application will be directed to the Verified Access.

module "route53_records" {
source = "terraform-aws-modules/route53/aws//modules/records"
version = "~> 2.0"

zone_id = var.zone_id

records = [
{
name = "app"
type = "CNAME"
ttl = 5
records = [aws_verifiedaccess_endpoint.access_endpoint]
}
]
}

Testing

You can download the complete project from this repository. Before applying the Terraform, ensure you update the DNS “zone_id’ and domain_ name parameters in the main.tf file.

Enter your application’s domain name into your web browser. Then, follow the authentication steps. If everything is successful, you will see the web page below.

Some Limitations

  • Currently, AWS Verified Access does not support ACM certificates with the key algorithm “ECDSA P 256”.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Published in Towards AWS

Where Cloud Experts, Heroes, Builders, and Developers share their stories, experiences, and solutions.

Responses (4)

Write a response