Cloud Connexa VPN Access
Cloud Connexa (powered by OpenVPN) provides secure VPN (Virtual Private Network) connectivity to your infrastructure and private resources.
This section explains how to configure VPN access with AWS IAM Identity Center (formerly AWS SSO) and how users experience VPN access.
This section explains how to configure VPN access with AWS IAM Identity Center (formerly AWS SSO) and how users experience VPN access.
Overview
Users connect to Cloud Connexa VPN through:- SSO (Single Sign-On) Integration – Authentication via AWS IAM Identity Center
- Automatic Provisioning – User accounts are created on first login
- Group-Based Access – Network access rules are tied to AWS SSO group membership
- Multi-Platform Clients – VPN clients available for desktop and mobile devices
Configure SSO Access
1
Assign groups to the VPN application
In the AWS Organization Management account:
- Go to AWS Identity Center → Applications → Customer managed
- Open the VPN application
- Click Assign users and groups
- Switch to the Groups tab
- Select the groups that require VPN access
- Click Assign
2
Open the Cloud Connexa Admin Panel
To manage VPN groups and access:
- From your SSO portal, open the VPN application
- This launches the Cloud Connexa administration panel (only available if you are manually assigned as an Administrator)

Managing VPN Groups
For Existing Groups
If the AWS SSO group already exists in Cloud Connexa:1
Verify automatic user creation
When a user logs into the VPN application through SSO for the first time:
- They are automatically created in Cloud Connexa
- They inherit permissions from their mapped SSO group
- No additional setup is needed
For New Groups
If you are creating a new AWS SSO group that needs VPN access:1
Assign the group to the VPN application
Ensure the new group is assigned to the VPN application in AWS Identity Center.
2
Create a VPN group in Cloud Connexa
In the Cloud Connexa admin panel:
- Navigate to Users → Groups
- Click Add Group
- Configure the group settings

3
Create an Access Group
Define which resources the VPN group can reach:
- Go to Access → Groups
- Click Create Access Group
- Configure access:
- Left panel: Choose the VPN group you created
- Right panel: Select applications or networks to grant access to
- Save your configuration
4
Map SSO groups to VPN groups
Link AWS SSO groups with Cloud Connexa groups:
- Go to Settings → User Authentication
- Click Edit
- Select View Group Mapping
- Click Add a Rule
- In SAML IdP User Group(s): enter the AWS SSO Group ID
- Choose the matching Cloud Connexa Access Group
- Click Save
User Experience
Once configured, here’s what VPN access looks like for users:1
Initial login
- User signs in to the AWS SSO portal
- Clicks on the VPN application
- Gets redirected to Cloud Connexa
- Account is automatically created on first login
2
VPN client setup
- User downloads the Cloud Connexa VPN client
- Configures it with provided connection details
- Signs in with their SSO credentials
- Establishes a secure VPN connection
3
Ongoing usage
- Users connect whenever VPN access is needed
- Authentication flows through SSO automatically
- Access is based on their group memberships
- Network rules are applied from Access Group configurations
Troubleshooting VPN Access
User can't see the VPN application
User can't see the VPN application
Possible causes:
- Group not assigned to the VPN application
- User needs to refresh their SSO session
- Group membership changes are still propagating
- Verify group assignment in AWS Identity Center
- Ask the user to log out and back in
- Wait 15–30 minutes for propagation
User created but has no network access
User created but has no network access
Possible causes:
- Group mapping misconfigured
- Access group doesn’t include required resources
- Incorrect SAML Group ID
- Review group mapping in Cloud Connexa settings
- Verify Access Group permissions
- Confirm AWS SSO Group ID matches Identity Center
VPN client connection issues
VPN client connection issues
Possible causes:
- Incorrect client configuration
- Firewall blocking VPN traffic
- Authentication failures
- Double-check client configuration
- Verify firewall rules allow VPN traffic
- Test login through the Cloud Connexa web console first
VPN Access Best Practices
- Grant least privilege – only provide network access users really need
- Separate environments – use different access rules for dev, staging, and production
- Review regularly – audit VPN user access at scheduled intervals
- Monitor connections – track VPN connection logs for unusual activity
- Strengthen sessions – use “Connect Auth: Every time” for higher security
- Keep documentation updated – clearly record the purpose of each VPN access group