Amazon managed applications - Amazon IAM Identity Center
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Amazon managed applications

Amazon managed applications integrate with IAM Identity Center and can use it for authentication and directory services.

The integration of Amazon managed applications with IAM Identity Center gives you an easier path to assign user access, without the need to set up separate federation or user and group synchronization for each application. You can connect the identity source that you want to use for authentication once, and you receive a single view of user and group assignments. Administrators of the applications that enable trusted identity propagation are able to define and audit access to their application resources based on a user or the user's group membership, without the need to map them to IAM roles.

Amazon managed applications provide an administrative user interface that you can use to manage access to application resources. For example, QuickSight administrators can assign users to access dashboards based on their group membership. Most Amazon managed applications also provide an Amazon Web Services Management Console experience that enables you to assign users to the application. The console experience for these applications might integrate both functions, to combine user assignment capabilities with the ability to manage access to application resources.

Amazon managed applications integrated with IAM Identity Center include:

Amazon managed applications that integrate with IAM Identity Center
Amazon managed application Integrated with organization instance of IAM Identity Center Integrated with account instances of IAM Identity Center Enables trusted identity propagation through IAM Identity Center
Amazon Athena SQL Yes Yes Yes
Amazon CodeCatalyst Yes Yes No
Amazon EMR notebooks Yes No No
Amazon EMR on Amazon EC2 Yes Yes Yes
Amazon EMR Studio Yes Yes Yes
Amazon Kendra Yes No No
Amazon Managed Grafana Yes No No
Amazon Monitron Yes No No
Amazon Nimble Studio Yes No No
Amazon Pinpoint Yes No No
Amazon Q Business Yes Yes No
Amazon Q Developer Yes Yes * No
Amazon QuickSight Yes Yes Yes
Amazon Redshift Yes Yes Yes
Amazon S3 Access Grants Yes Yes Yes
Amazon SageMaker Studio Yes No No
Amazon WorkSpaces Web Yes No No
Amazon CLI Yes No No
Amazon Deadline Cloud Yes Yes No
Amazon IoT Events Yes No No
Amazon IoT Fleet Hub Yes No No
Amazon IoT SiteWise Yes No No
Amazon Lake Formation Yes Yes Yes
Amazon Supply Chain Yes No No
Amazon Systems Manager Yes No No
Amazon Verified Access Yes No No

* Account instances of IAM Identity Center are supported unless your users require access to Amazon Q in the Amazon Console.

Controlling access

Access to Amazon managed applications is controlled in two ways:

  • Initial entry to the application – IAM Identity Center manages this through assignments to the application. By default, assignments are required for Amazon managed applications.

  • Access to application resources – The application manages this through independent resource assignments that it controls.

Coordinating administrative tasks

If you're an application administrator, you can choose whether to require assignments to an application. If assignments are required, when users sign in to the Amazon Web Services access portal, only users who are assigned to the application directly or through a group assignment can view the application tile. Alternatively, if assignments aren't required, you can allow all IAM Identity Center users to enter the application. In this case, the application manages access to resources and the application tile is visible to all users who visit the Amazon Web Services access portal.

If you’re an IAM Identity Center administrator, you can use the IAM Identity Center console to remove assignments to Amazon managed applications. Before you remove assignments, we recommend that you coordinate with the application administrator. You should also coordinate with the application administrator if you plan to modify the setting that determines whether assignments required, or automate application assignments.

Configuring IAM Identity Center to share identity information

IAM Identity Center provides an identity store that contains user and group attributes, excluding sign-in credentials. You can use either of the following methods to keep the users and groups in your IAM Identity Center identity store updated:

  • Use the IAM Identity Center identity store as your main identity source. If you choose this method, you manage your users, their sign-in credentials, and groups from within the IAM Identity Center console or Amazon Command Line Interface (Amazon CLI). For more information, see Manage identities in IAM Identity Center.

  • Set up provisioning (synchronization) of users and groups coming from either of the following identity sources to your IAM Identity Center identity store:

    If you choose this provisioning method, you continue managing your users and groups from within your identity source, and those changes are synchronized to the IAM Identity Center identity store.

Whichever identity source you choose, IAM Identity Center can share the user and group information with Amazon managed applications. That way, you can connect an identity source to IAM Identity Center once and then share identity information with multiple applications in the Amazon Web Services Cloud. This eliminates the need to independently set up federation and identity provisioning with each application. This sharing feature also makes it easy to give your users access to many applications in different Amazon Web Services accounts.

Considerations for sharing identity information in Amazon Web Services accounts

IAM Identity Center supports most commonly used attributes across applications. These attributes include first and last name, phone number, email address, address, and preferred language. Carefully consider which applications and which accounts can use this personally identifiable information.

You can control access to this information in either of the following ways. You can choose to enable access in only the Amazon Organizations management account or in all accounts in Amazon Organizations. Or, you can use service control policies (SCPs) to control which applications can access the information in which accounts in Amazon Organizations. For example, if you enable access in the Amazon Organizations management account only, then applications in member accounts have no access to the information. However, if you enable access in all accounts, you can use SCPs to disallow access by all applications except those you want to permit.

Enabling identity-aware console sessions

An identity-aware session for the console enhances a user's Amazon console session by providing some additional user context to personalize that user's experience. This capability is currently supported for users of Amazon Q in the Amazon Console.

You can enable identity-aware console sessions without making any changes to existing access patterns or federation into the Amazon console today. If your users sign in to the Amazon console with IAM (for example, if they sign in as IAM users or through federated access with IAM), they can continue using these methods. If your users sign in to the Amazon Web Services access portal, they can continue using their IAM Identity Center user credentials.

Prerequisites and considerations

Before you enable identity-aware console sessions, review the following prerequisites and considerations:

  • You must enable identity-aware console sessions for users who require access to Amazon Q in the Amazon Console.

  • Identity-aware console sessions are currently only supported for use with Amazon Q in the Amazon Console.

  • Identity-aware console sessions require an organization instance of IAM Identity Center.

  • Integration with Amazon Q isn't supported if you enable IAM Identity Center in an opt-in Amazon Web Services Region.

  • After you enable identity-aware console sessions, you can't disable this capability.

  • To enable identity-aware console sessions, you must have the following permissions:

    • sso:CreateApplication

    • sso:GetSharedSsoConfiguration

    • sso:ListApplications

    • sso:PutApplicationAssignmentConfiguration

    • sso:PutApplicationAuthenticationMethod

    • sso:PutApplicationGrant

    • sso:PutApplicationAccessScope

    • signin:CreateTrustedIdentityPropagationApplicationForConsole

    • signin:ListTrustedIdentityPropagationApplicationForConsole

  • To enable your users to use identity-aware console sessions, you must grant them the sts:setContext permission in an identity-based policy. For information, see Granting users permissions to use identity-aware console sessions.

How to enable identity-aware-console sessions

You can enable identity-aware console sessions in the Amazon Q console or in the IAM Identity Center console.

Enable identity-aware console sessions in the Amazon Q console

Before you enable identity-aware console sessions, you must have an organization instance of IAM Identity Center with an identity source connected. If you've already configured IAM Identity Center, skip to step 3.

  1. Open the IAM Identity Center console. Choose Enable, and create an organization instance of IAM Identity Center. For information, see Enabling Amazon IAM Identity Center.

  2. Connect your identity source to IAM Identity Center and provision users into IAM Identity Center. You can choose the default IAM Identity Center directory as your identity source, or you can use another identity provider. For more information, see Getting started tutorials.

  3. After you finish setting up IAM Identity Center, open the Amazon Q console and follow the steps in Subscriptions in the Amazon Q Developer User Guide. Make sure to enable identity-aware console sessions.

    Note

    If you don't have sufficient permissions to enable identity-aware console sessions, you might need to ask an IAM Identity Center administrator to perform this task for you in the IAM Identity Center console. For more information, see the next procedure.

Enable identity-aware console sessions in the IAM Identity Center console

If you're an IAM Identity Center administrator, you might be asked by another administrator to enable identity-aware console sessions in the IAM Identity Center console.

  1. Open the IAM Identity Center console.

  2. In the navigation pane, choose Settings.

  3. Under Enable identity-aware sessions, choose Enable.

  4. In the second message, choose Enable.

  5. After you finish enabling identity-aware console sessions, a confirmation message appears at the top of the Settings page.

  6. In the Details section, the status for Identity-aware sessions is Enabled.

How identity-aware console sessions work

With identity-aware console sessions, users of Amazon Q in the Amazon Console can sign in to Amazon, open the Amazon Web Services Management Console or other Amazon website, choose the Amazon Q icon, and start a chat or use other supported features. For more information, see the Amazon Q Developer User Guide.

IAM Identity Center enhances a user's current console session to include the active IAM Identity Center user's ID and the IAM Identity Center session ID.

Identity-aware console sessions include the following three values:

  • Identity store user ID (identitystore:UserId) - This value is used to uniquely identify a user in the identity source that is connected to IAM Identity Center.

  • Identity store directory ARN (identitystore:IdentityStoreArn) - This value is the ARN of the identity store that is connected to IAM Identity Center, and where you can look up attributes for identitystore:UserId.

  • IAM Identity Center session ID - This value indicates whether the user's IAM Identity Center session is still valid.

The values are the same, but obtained in different ways and added at different points of the process, depending on how the user signs in:

  • IAM Identity Center (Amazon Web Services access portal): In this case, the user's identity store user ID and ARN values are already provided in the active IAM Identity Center session. IAM Identity Center enhances the current session by adding only the session ID.

  • Other sign-in methods: If the user signs in to Amazon as an IAM user, with an IAM role, or as a federated user with IAM, none of these values are provided. IAM Identity Center enhances the current session by adding the identity store user ID, identity store directory ARN, and the session ID.

Constraining the use of Amazon managed applications

When you enable IAM Identity Center for the first time, Amazon allows the use of Amazon managed applications automatically in all accounts in Amazon Organizations. To constrain applications, you must implement SCPs. You can use SCPs to block access to the IAM Identity Center user and group information and to prevent the application from being started, except in designated accounts.

Viewing details about an Amazon managed application

After you connect an Amazon managed application to IAM Identity Center by using the console or APIs for the application, the application is registered with IAM Identity Center. After an application is registered with IAM Identity Center, you can view detailed information about the application in the IAM Identity Center console.

To view information about an Amazon managed application in the IAM Identity Center console
  1. Open the IAM Identity Center console.

  2. Choose Applications.

  3. Choose the Amazon managed applications tab.

  4. In the list of applications, choose the name of the application for which you want to view detailed information.

  5. Information about the application includes whether user and group assignments are required, and if applicable, assigned users and groups and trusted applications for identity propagation. For information about trusted identity propagation, see Trusted identity propagation across applications.

Disabling an Amazon managed application

To prevent users from authenticating to an Amazon managed application, you can disable the application in the IAM Identity Center console.

Warning

Disabling an application deletes all user permissions to this application, disconnects the application from IAM Identity Center, and renders the application inaccessible. If you’re an IAM Identity Center administrator, we recommend that you coordinate with the application administrator before performing this task.

To disable an Amazon managed application
  1. Open the IAM Identity Center console.

  2. Choose Applications.

  3. On the Applications page, under Amazon managed applications, choose the application that you want to disable.

  4. With the application selected, choose Actions, and then choose Disable.

  5. In the Suspend application dialog box, choose Suspend.

  6. In the Amazon managed applications list, the application status appears as Inactive.