

# Replicate IAM Identity Center to an additional Region
<a name="replicate-to-additional-region"></a>

 If your environment meets the [prerequisites](multi-region-iam-identity-center.md#multi-region-prerequisites), such as configuring IAM Identity Center with a multi-Region customer managed KMS key, complete the following steps to replicate your IAM Identity Center instance to an additional Region. Your primary Region continues to operate normally during and after these steps.

## Step 1: Create a replica key in the additional Region
<a name="replicate-kms-key"></a>

 Before replicating IAM Identity Center to a Region, you must first create a replica key of your customer managed KMS key in that Region and configure the replica key with the permissions required for the operations of IAM Identity Center. For instructions on creating multi-Region replica keys, see [Create multi-Region replica keys](https://docs.amazonaws.cn/kms/latest/developerguide/multi-region-keys-replicate.html). 

 The recommended approach for the KMS key permissions is to copy the key policy from the primary key, which grants the same permissions already established for IAM Identity Center in the primary Region. Alternatively, you can define Region-specific key policies, though this approach increases the complexity of managing permissions across Regions and may require additional coordination when updating policies in the future. 

**Note**  
Amazon KMS doesn't synchronize your KMS key policy across the Regions of your multi-Region KMS key. To keep the KMS key policy in sync across the KMS key Regions, you will need to apply changes in each Region individually. 

## Step 2: Add the Region in IAM Identity Center
<a name="add-region-step"></a>

Adding a Region in IAM Identity Center triggers automatic replication of IAM Identity Center data to that Region. The replication is asynchronous with eventual consistency. The following tabs provide instructions for doing this in the Amazon Web Services Management Console and Amazon CLI.

------
#### [ Console ]

 **To add a Region** 

1.  Open the [IAM Identity Center console](https://console.aws.amazon.com/singlesignon/). 

1.  In the navigation pane, choose **Settings**. 

1.  Choose the **Management** tab. 

1.  In the **Regions for IAM Identity Center** section, choose **Add Region**. 

1.  In the **Amazon Web Services Regions available for replication** section, choose your preferred Amazon Web Services Region. If the Region doesn't appear in the list, it's not available for replication because the KMS key hasn't been replicated there. For more information, see [Implementing customer managed KMS keys in Amazon IAM Identity Center](identity-center-customer-managed-keys.md).

1.  Choose **Add Region**. 

1.  In the **Regions for IAM Identity Center** section, monitor the Region status. Use the **Refresh** button (circular arrow) to check the latest Region status as needed. After the replication completes, proceed to Step 2. 

------
#### [ Amazon CLI ]

 **To add a Region** 

```
aws sso-admin add-region \
    --instance-arn arn:aws:sso:::instance/ssoins-1234567890abcdef \
    --region-name eu-west-1
```

 **To check the current Region status** 

```
aws sso-admin describe-region \
    --instance-arn arn:aws:sso:::instance/ssoins-1234567890abcdef \
    --region-name eu-west-1
```

 When the Region status is ACTIVE, you can proceed to Step 2. 

------

 The duration of the initial replication to an additional Region depends on the amount of data in your IAM Identity Center instance. Subsequent incremental changes are replicated within seconds in most cases. 

## Step 3: Update external IdP setup
<a name="update-external-idp-setup"></a>

 Follow the tutorial for your external IdP in [IAM Identity Center identity source tutorials](tutorials.md) for the following steps: 

 **Step 3.a: Add the Assertion Consumer Service (ACS) URLs to your external IdP** 

 This step enables direct sign-in to each additional Region and is required to enable sign-in to Amazon managed applications deployed in those Regions and for access to Amazon Web Services accounts through those Regions. To learn where to find the ACS URLs, see [ACS endpoints in the primary and additional Amazon Web Services Regions](multi-region-workforce-access.md#acs-endpoints). 

 **Step 3.b (Optional): Make the Amazon Web Services access portal available in the external IdP portal** 

 Make the Amazon Web Services access portal in the additional Region available as a bookmark app in the external IdP portal. Bookmark apps contain only a link (URL) to the desired destination and are similar to a browser bookmark. You can find the Amazon Web Services access portal URLs in the console by choosing **View all Amazon Web Services access portal URLs** in the **Regions for IAM Identity Center** section. For more information, see [Amazon Web Services access portal endpoints in the primary and additional Amazon Web Services Regions](multi-region-workforce-access.md#portal-endpoints). 

 IAM Identity Center supports IdP-initiated SAML SSO in each additional Region, but external IdPs typically support this with only a single ACS URL. For continuity, we recommend keeping the primary Region's ACS URL in use for IdP-initiated SAML SSO and relying on bookmark apps and browser bookmarks for access to additional Regions. 

## Step 4: Confirm firewall and gateway allow-lists
<a name="confirm-firewall-allowlists"></a>

 Review your domain allow-lists in firewalls or gateways, and update them based on the [documented allow-lists](enable-identity-center-portal-access.md). 

## Step 5: Provide information to your users
<a name="provide-user-information"></a>

 Provide your users with information about the new setup, including the Amazon Web Services access portal URL in the additional Region and how to use the additional Regions. Review the following sections for relevant details: 
+  [Workforce access through an additional Region](multi-region-workforce-access.md) 
+  [Failover to an additional Region for Amazon Web Services account access](multi-region-failover.md) 
+  [Deploying and managing applications across multiple Amazon Regions](multi-region-application-use.md) 

## Region changes beyond adding the first Region
<a name="making-changes-regions"></a>

You can add and remove additional Regions. The primary Region cannot be removed other than by deleting the entire IAM Identity Center instance. For more information on removing a Region, see [Remove a Region from IAM Identity Center](remove-region.md).

You cannot promote an additional Region to be the primary or demote the primary Region to be additional.

## What data is replicated?
<a name="replicated-data"></a>

 IAM Identity Center replicates the following data: 


| Data | Replication source and target | 
| --- | --- | 
| Workforce identities (users, groups, group memberships) | From the primary Region to the additional Regions | 
| Permission sets and their assignments to users and groups | From the primary Region to the additional Regions | 
| Configuration (such as external IdP SAML settings) | From the primary Region to the additional Regions | 
| Application metadata and application assignments to users and groups | From an application's connected IAM Identity Center Region to the other enabled Regions | 
| Trusted token issuers | From the primary Region to the additional Regions | 
| Sessions | From the session's originating Region to the other enabled Regions | 

**Note**  
 IAM Identity Center doesn't replicate data stored in Amazon managed applications. Also, it doesn't change the regional footprint of an application deployment. For example, if your IAM Identity Center instance in in US East (N. Virginia), and you have Amazon Redshift deployed in the same Region, replicating IAM Identity Center to US West (Oregon) doesn't affect the deployment Region of Amazon Redshift and the data it stores. 

 **Considerations:** 
+  **Global resource identifiers across enabled Regions** - Users, groups, permission sets, and other resources have the same identifiers across the enabled Regions. 
+  **Replication doesn't affect provisioned IAM roles** - Existing IAM roles provisioned from permission set assignments are used during account sign-in from any enabled Region. 