- Amazon IAM›
- Amazon IAM Identity Center
Amazon IAM Identity Center FAQs
General
Open all- Sign in to the Amazon Web Services Management Console of the management account in your Amazon Web Services account and navigate to the IAM Identity Center console.
- Select the directory you use for storing the identities of your users and groups from the IAM Identity Center console. IAM Identity Center provides you a directory by default that you can use to manage users and groups in IAM Identity Center. You can also change directory to connect to a Microsoft AD directory by clicking through a list of Managed Microsoft AD and AD Connector instances that IAM Identity Center discovers in your account automatically. If you want to connect to a Microsoft AD directory, see Setting up Amazon Directory Service .
- Grant users single sign-on access to Amazon Web Services accounts in your organization by selecting the Amazon Web Services accounts from a list populated by IAM Identity Center, and then selecting users or groups from your directory and the permissions you want to grant them.
- Give users access to business cloud applications by:
a. Selecting one of the applications from the list of pre-integrated applications supported in IAM Identity Center.
b. Configuring the application by following the configuration instructions.
c. Selecting the users or groups that should be able to access this application. - Give your users the IAM Identity Center sign-in web address that was generated when you configured the directory so that they can sign in to IAM Identity Center and access accounts and business applications.
Identity sources and applications support
Open all- IAM Identity Center-integrated applications: IAM Identity Center-integrated applications use IAM Identity Center for authentication and work with the identities you have in IAM Identity Center. There is no need for additional configuration to synchronize identities into these applications or to set up federation to separately.
- Pre-integrated SAML applications: IAM Identity Center comes pre-integrated with commonly used business applications. For a comprehensive list, see the IAM Identity Center console.
- Custom SAML applications: IAM Identity Center supports applications that allow identity federation using SAML 2.0. You can enable IAM Identity Center to support these applications by using the custom application wizard.
Single sign-on access to Amazon Web Services accounts
Open allSingle sign-on access to business applications
Open allMiscellaneous
Open allIAM Identity Center stores your user and group attributes, the metadata about which Amazon Web Services accounts and cloud applications are assigned to which users and groups, and what permissions have been granted for accessing Amazon Web Services accounts. IAM Identity Center also creates and manages IAM roles in individual Amazon Web Services accounts for each permission set you grant access for your users.
IAM Identity Center integrates with Amazon Key Management Service (KMS) to encrypt your data at rest. By default, IAM Identity Center encrypts your data with Amazon-owned KMS keys. If you want to have full control and visibility over your encryption key management and use, you can provide your own customer-managed KMS keys to encrypt your identity data such as user and group attributes. IAM Identity Center also signs your data at rest to protect it from tampering.
IAM Identity Center encrypts your data in transit using TLS 1.2 and TLS 1.3.
With IAM Identity Center, you can enable standard-based strong authentication capabilities for all your users across all identity sources. If you use a supported SAML 2.0 IdP as your identity source, you can enable multi-factor authentication capabilities of your provider. When using IAM Identity Center or Active Directory as your identity source, IAM Identity Center supports the Web Authentication specification to help you secure user access to Amazon Web Services accounts and business applications with FIDO-enabled security keys, such as YubiKey, and built-in biometric authenticators, such as Touch ID on Apple MacBooks and facial recognition on PCs. You can also enable one-time-passwords (TOTPs) using authenticator apps such as Twilio Authy*.
You can also use your existing Remote Authentication Dial-In User Service (RADIUS) MFA configuration with IAM Identity Center and Amazon Directory Service to authenticate your users as a secondary form of verification. To learn more about configuring MFA with IAM Identity Center, visit the IAM Identity Center User Guide.
Yes. For user identities in IAM Identity Center’s identity store and Active Directory, IAM Identity Center supports the Web Authentication (WebAuthn) specification to help you secure user access to Amazon Web Services accounts and business applications with FIDO-enabled security keys, such as YubiKey, and built-in biometric authenticators, such as Touch ID on Apple MacBooks and facial recognition on PCs. You can also enable one-time-passwords (TOTPs) using authenticator apps such as Twilio Authy*.
*The application and identity providers referenced here are third parties. Their instances may be located outside of China. Customers should verify the location of the instances with the third-party providers directly, and customers should confirm whether any cross-border transfers of data comply with their obligations under applicable laws. If customers use the services offered by these third parties, customers may experience higher latency due to reasons beyond the control of Amazon Web Services (e.g., if the third party’s servers are outside of China), and customers should work with the third-party provider directly to address latency.
Employees can get started with IAM Identity Center by visiting the access portal that is generated when you configure your identity source in IAM Identity Center. If you manage your users in IAM Identity Center, your employees can use their email address and password they configured with IAM Identity Center to sign into the user portal. If you connect IAM Identity Center to a Microsoft Active Directory or a SAML 2.0 identity provider, your employees can sign in to user portal with their existing corporate credentials and then view the accounts and applications assigned to them. To access an account or application, employees choose the associated icon from the access portal.
Yes. IAM Identity Center provides account assignment APIs to help you automate permissions management in multi-account environments, and retrieve the permissions programmatically for audit and governance purposes.