Category
Security, identity, and compliance
1. Introduction
AWS IAM Identity Center is AWS’s recommended service for centrally managing workforce user access to AWS accounts and business applications. It helps you replace long-lived IAM user credentials and “one-off” account access patterns with centralized, auditable, least-privilege access based on groups and permission sets.
In simple terms: AWS IAM Identity Center lets your employees sign in once and get the right access to the right AWS accounts and applications, without sharing passwords or manually creating IAM users in every account.
Technically, AWS IAM Identity Center (formerly AWS Single Sign-On) integrates with AWS Organizations and AWS IAM to provision and manage short-lived role sessions in member accounts using permission sets. It can use its built-in Identity Center directory (Identity Store) or federate to an external identity provider (IdP) such as Microsoft Entra ID (Azure AD), Okta, or other SAML 2.0 / OIDC-compatible IdPs (capabilities vary; verify in official docs for your IdP).
The problem it solves: secure, scalable, centralized access management across many AWS accounts and applications—reducing operational overhead, improving auditing, and making it easier to enforce MFA and least privilege consistently.
Naming note (important): AWS IAM Identity Center is the current name for the service previously known as AWS Single Sign-On (AWS SSO). Many AWS pages, APIs, and CLI commands still use “sso” naming.
2. What is AWS IAM Identity Center?
Official purpose
AWS IAM Identity Center is designed to centrally manage workforce identity access to: – AWS accounts (one account or many accounts in AWS Organizations) – Cloud applications and custom applications that support federation (commonly via SAML 2.0; verify supported app integrations) – The AWS access portal, which provides a user-friendly launchpad for accounts and apps
Core capabilities
- Centralized user and group management (built-in directory) or federation to external IdPs
- Assign users/groups to AWS accounts with permission sets
- Provision access into AWS accounts as IAM roles and policies (no need for IAM users)
- Centralized sign-in experience via AWS access portal
- Auditing and governance integrations (notably AWS CloudTrail for API activity and AWS IAM for policy enforcement)
Major components
- IAM Identity Center instance: The configuration boundary (enabled in one “home” AWS Region—verify current regional behavior in docs).
- Identity source:
- Identity Center directory (built-in identity store)
- External IdP (for example Entra ID or Okta) using federation and (often) SCIM for provisioning
- AWS Directory Service options may be used in some architectures (for example AD Connector / AWS Managed Microsoft AD)—verify current supported modes for your environment
- AWS access portal: End-user sign-in URL and app/account launcher
- Permission sets: Templates that define what a user/group can do in target AWS accounts (via managed policies, inline policies, and other settings supported by the service)
- Account assignments: Mappings between principals (users/groups), permission sets, and target AWS accounts
- Provisioned IAM roles: Roles created in each target account based on permission sets (often named with an
AWSReservedSSO_prefix)
Service type
A managed AWS identity and access service in the Security, identity, and compliance category, focused on workforce access.
Scope: regional/global/account/organization
- Common deployment pattern: enabled in the AWS Organizations management account (or delegated administrator) and used to manage access to multiple member accounts.
- Regionality: IAM Identity Center is configured in a specific AWS Region (often referred to as the home Region). Many aspects are regional even though the impact spans accounts in your organization. Verify current regional constraints and multi-Region behavior in official docs.
How it fits into the AWS ecosystem
AWS IAM Identity Center sits at the center of these relationships: – AWS Organizations: inventory of accounts; enables scalable assignment across accounts and OUs. – AWS IAM: enforcement mechanism inside each AWS account via IAM roles/policies that are provisioned from permission sets. – AWS Control Tower (optional but common): many Control Tower environments use IAM Identity Center for account access and governance. – AWS CloudTrail: audit API calls and configuration changes. – AWS Directory Service / External IdP: identity lifecycle, MFA, and corporate authentication.
3. Why use AWS IAM Identity Center?
Business reasons
- Faster onboarding/offboarding: central access management reduces delays and human error.
- Reduced credential risk: avoids long-lived access keys tied to individual IAM users.
- Better audit posture: consistent visibility into who has access to what across accounts.
Technical reasons
- Multi-account access at scale using permission sets and account assignments.
- Federation support: integrate with corporate identity providers and use existing MFA policies.
- Short-lived sessions rather than permanent credentials for most interactive use.
Operational reasons
- Central administration: fewer per-account IAM user setups.
- Standardized roles: permission sets become reusable building blocks.
- Easier access reviews: centralized assignment model supports periodic reviews.
Security/compliance reasons
- Least privilege becomes repeatable with permission sets aligned to job functions.
- MFA enforcement through external IdP or IAM Identity Center’s supported MFA capabilities (verify current MFA options).
- Auditability: changes to assignments and sign-ins can be logged and reviewed (CloudTrail and related audit tooling).
Scalability/performance reasons
- Scales with AWS Organizations: assign access across many accounts and OUs.
- Supports consistent access patterns as environments grow from a few accounts to hundreds.
When teams should choose it
Choose AWS IAM Identity Center when you need: – Workforce access to multiple AWS accounts – A central place to manage who can assume what role – Federation with an external IdP and SSO to AWS accounts and apps – A cleaner alternative to distributing IAM user credentials
When teams should not choose it
Consider alternatives or additional patterns when: – You are solving application end-user identity (customers signing into your app). That’s typically Amazon Cognito or another CIAM solution. – You need machine-to-machine access for workloads (use IAM roles, IAM Roles Anywhere, workload identity federation patterns, etc.). – You want fully self-managed identity (some organizations may prefer self-hosted IdPs like Keycloak, but IAM Identity Center can still integrate for AWS account access).
4. Where is AWS IAM Identity Center used?
Industries
- Financial services, healthcare, and public sector needing strong access control and auditing
- SaaS and tech companies running multi-account AWS landing zones
- Retail and media companies with multi-team platform operations
Team types
- Platform engineering teams building AWS landing zones
- Security engineering and IAM teams standardizing access controls
- DevOps/SRE teams managing production access and break-glass paths
- Operations teams who need controlled console access
Workloads
- Multi-account environments (dev/test/prod separation)
- Data platforms (analytics teams needing controlled access)
- Shared services accounts (network, logging, security tooling)
- Regulated environments with strict access control requirements
Architectures
- AWS Organizations + (optional) AWS Control Tower landing zone
- Federation to corporate IdP (Entra ID/Okta) with centralized lifecycle management
- Centralized security logging and access review workflows
Real-world deployment contexts
- Production: centralized SSO for administrators and engineers, integrated with ticketing approvals and privileged access workflows (where applicable).
- Dev/test: quick access for developers to sandbox accounts with constrained permission sets.
5. Top Use Cases and Scenarios
Below are realistic scenarios where AWS IAM Identity Center is a strong fit.
1) Centralized SSO for a multi-account AWS Organization
- Problem: Users need access to many AWS accounts; creating IAM users everywhere is unmanageable.
- Why it fits: Permission sets + assignments scale across accounts and OUs.
- Example: A company with 60 accounts assigns “ReadOnly” to all engineers and “PowerUser” only to platform team members in dev accounts.
2) Standard job-function access with reusable permission sets
- Problem: Teams keep reinventing roles and policies per account.
- Why it fits: Permission sets act as centrally managed role templates.
- Example: Create
BillingView,SecurityAudit,DeveloperReadOnly,PlatformAdminpermission sets and reuse them everywhere.
3) External IdP federation (Entra ID/Okta) for corporate authentication
- Problem: Users already exist in an enterprise IdP; you want consistent MFA and lifecycle processes.
- Why it fits: IAM Identity Center supports federation and (commonly) SCIM-based provisioning (verify for your IdP).
- Example: HR offboarding disables the Entra ID account, which automatically removes AWS account access.
4) Controlled console access without IAM user passwords
- Problem: Teams still use IAM user console passwords for human access.
- Why it fits: Identity Center provides role-based console access via SSO.
- Example: Developers use AWS access portal to access only dev accounts; production access requires an elevated group.
5) Faster onboarding for contractors with limited access and expiry
- Problem: Contractors need time-limited access across a few accounts.
- Why it fits: Central assignments can be granted and revoked quickly; session durations can be controlled.
- Example: Contractors get a permission set allowing access to specific services in a single project account; removed at project end.
6) Separation of duties (SoD) across environments
- Problem: Same people should not have admin rights in both dev and production.
- Why it fits: Different permission sets and assignments per OU/account enforce SoD.
- Example: Developers are
PowerUserin dev accounts butReadOnlyin production.
7) Standardized break-glass and emergency access paths
- Problem: You need a controlled, auditable emergency admin process.
- Why it fits: A dedicated “BreakGlassAdmin” permission set and tightly controlled group can be used with strict audit.
- Example: Only security leads can assume break-glass roles; all usage is monitored and reviewed.
8) SSO launchpad for third-party applications
- Problem: Users need access to business apps with centralized login.
- Why it fits: IAM Identity Center can present assigned applications in the access portal (app integration support varies; verify).
- Example: Users access a SAML-integrated internal dashboard or analytics tool from the portal.
9) Account access governance for platform operations
- Problem: Platform teams must ensure consistent access across new accounts.
- Why it fits: When new accounts are created under an OU, you can apply consistent assignment patterns (often automated).
- Example: New “Workloads” accounts automatically get
SecurityAuditassigned to the security group.
10) Developer CLI access via SSO sessions
- Problem: Developers use long-lived access keys in laptops and CI scripts.
- Why it fits: AWS CLI can authenticate via SSO; reduces access key sprawl for human users.
- Example: Engineers run
aws sso loginto get short-lived credentials and then use CLI safely.
11) Central auditing and access reviews
- Problem: Auditors ask “who has access to prod?” and answers are scattered.
- Why it fits: Assignments are centralized and can be exported/reviewed.
- Example: Security generates periodic reports of production account assignments per group.
12) M&A integration: unify AWS access quickly
- Problem: Two orgs merge; access needs to be standardized.
- Why it fits: IAM Identity Center provides a consistent access model even while directory consolidation is in progress.
- Example: Both companies federate to the same IdP tenant; access is governed by groups.
6. Core Features
1) AWS access portal (user sign-in and app/account launcher)
- What it does: Provides a central URL where users authenticate and then select AWS accounts/roles (permission sets) and assigned applications.
- Why it matters: Reduces friction and avoids sharing account IDs, role ARNs, and console URLs.
- Practical benefit: Engineers can quickly switch between accounts/roles.
- Limitations/caveats: Portal behavior and branding options may be limited; verify customization options in docs.
2) Permission sets (centralized role templates)
- What it does: Defines the effective permissions for users when accessing a target AWS account, typically by attaching IAM policies and settings.
- Why it matters: Standardizes access patterns and reduces per-account drift.
- Practical benefit: One “ReadOnly” permission set can be reused across all accounts.
- Limitations/caveats: Updates require provisioning to propagate to accounts; propagation can take time (eventual consistency).
3) Account assignments (user/group → permission set → AWS account)
- What it does: Grants a user or group the ability to access an AWS account with a specific permission set.
- Why it matters: Clear, auditable mapping of access.
- Practical benefit: Easy to revoke access by removing an assignment.
- Limitations/caveats: Large environments need careful group design to avoid assignment sprawl.
4) Multi-account governance via AWS Organizations integration
- What it does: Lets you manage access across accounts in an AWS Organization.
- Why it matters: Organizations is the standard for multi-account AWS governance.
- Practical benefit: Central team can manage access for all accounts from one place.
- Limitations/caveats: If you don’t use Organizations, you can still use IAM Identity Center in limited modes, but multi-account governance benefits are reduced (verify current support).
5) Identity source options (built-in directory or external IdP)
- What it does: Choose where users and groups come from.
- Why it matters: Enterprises usually want external IdP integration; smaller teams may start with the built-in directory.
- Practical benefit: You can start simple and later federate to corporate identity.
- Limitations/caveats: Migration between identity sources requires planning; verify supported migration paths.
6) Federation to external identity providers
- What it does: Integrates IAM Identity Center with external IdPs for authentication (commonly SAML 2.0; OIDC support depends on integration mode—verify).
- Why it matters: Centralized MFA and lifecycle management.
- Practical benefit: Enforce corporate MFA and conditional access policies at the IdP.
- Limitations/caveats: Setup varies by IdP; SCIM provisioning may require additional configuration and licensing in the IdP.
7) Automated provisioning into AWS accounts (IAM role creation)
- What it does: IAM Identity Center provisions roles and policies into target accounts based on permission sets.
- Why it matters: You don’t handcraft roles in every account.
- Practical benefit: Consistent role naming and permission behavior across accounts.
- Limitations/caveats: Provisioning can fail due to policy limits, SCP restrictions, or conflicting role names; requires troubleshooting.
8) Session management (duration and re-authentication)
- What it does: Controls session duration settings and access behavior for console/CLI sessions (within supported limits).
- Why it matters: Balances usability with security.
- Practical benefit: Shorter sessions for privileged roles reduce risk.
- Limitations/caveats: Maximum/minimum durations and behavior depend on service constraints; verify current limits.
9) Application assignments (SSO to business applications)
- What it does: Presents assigned applications in the AWS access portal and supports federated sign-in.
- Why it matters: Centralizes workforce app access alongside AWS account access.
- Practical benefit: One portal for AWS accounts and SAML apps.
- Limitations/caveats: Not all apps are supported; custom SAML app setup requires careful attribute/claim mapping.
10) Auditability via AWS logging services
- What it does: Integrates with AWS CloudTrail for API auditing and supports operational monitoring patterns.
- Why it matters: Essential for security investigations and compliance.
- Practical benefit: Track administrative changes to assignments and configurations.
- Limitations/caveats: You must configure appropriate trails/log storage to meet retention requirements.
7. Architecture and How It Works
High-level architecture
At a high level: 1. A user authenticates to IAM Identity Center (either directly to the built-in directory or via federation to an external IdP). 2. The user selects an AWS account and a role (permission set) in the AWS access portal. 3. IAM Identity Center issues a federated session and the user assumes an IAM role in the target AWS account that was provisioned from the permission set. 4. AWS IAM enforces authorization using the policies attached to that role.
Control flow vs data flow
- Control plane: Admins manage users/groups, permission sets, and assignments in IAM Identity Center. Provisioning writes roles/policies into target accounts.
- Data plane: Users operate in AWS services using the assumed role credentials. AWS service APIs evaluate IAM policies and (optionally) SCPs, permission boundaries, and resource policies.
Integrations with related services
- AWS Organizations: enumerate accounts and apply org-wide governance (SCPs, OUs).
- AWS IAM: target-account role and policy enforcement; trust relationships for SSO-provisioned roles.
- AWS CloudTrail: logs Identity Center administrative actions and subsequent AWS API calls under assumed roles.
- AWS Control Tower (optional): commonly uses IAM Identity Center as the access layer for the landing zone.
- AWS Directory Service / External IdPs: identity lifecycle and authentication.
Dependency services
- IAM in every target account (roles/policies).
- Organizations (recommended) for multi-account.
- CloudTrail / S3 / CloudWatch Logs (optional but typical) for audit retention and monitoring.
Security/authentication model
- Authentication: handled by the configured identity source (built-in directory or external IdP).
- Authorization:
- At sign-in time: IAM Identity Center checks assignments.
- In target accounts: IAM policies attached to the provisioned role determine what’s allowed, combined with SCPs, resource policies, session policies, and permission boundaries where applicable.
- Credential model: short-lived role sessions for human access, reducing access key sprawl.
Networking model
- IAM Identity Center is a managed service accessed via AWS console/browser and AWS APIs. There is no VPC attachment required for standard usage. Network restrictions are typically implemented via:
- External IdP conditional access policies
- Corporate proxies and device posture solutions
- IAM policy conditions (e.g., source IP) where appropriate (be careful: IP-based controls can be brittle for remote work)
- Service Control Policies (SCPs) for governance
Monitoring/logging/governance considerations
- CloudTrail: ensure trails capture management events and are retained per compliance needs.
- Central log archive: store CloudTrail logs in a security/log archive account.
- Access reviews: regularly review assignments and group membership in the identity source.
- Provisioning health: monitor provisioning failures and drift.
Simple architecture diagram (Mermaid)
flowchart LR
U[User] --> P[AWS access portal<br/>IAM Identity Center]
P -->|Authenticate| IDP[Identity source<br/>(Built-in directory or External IdP)]
P -->|Select account + permission set| IAMIC[AWS IAM Identity Center]
IAMIC -->|Provision role/policies| A1[AWS Account]
U -->|Assume role session| A1
A1 --> SVC[AWS Services APIs]
Production-style architecture diagram (Mermaid)
flowchart TB
subgraph Corp[Corporate Identity & Governance]
IDP[External IdP (e.g., Entra ID/Okta)]
HR[HR / Joiner-Mover-Leaver process]
GRC[Access reviews / GRC]
end
subgraph AWSOrg[AWS Organization]
MGMT[Management account<br/>IAM Identity Center enabled]
SEC[Security account<br/>SIEM + tooling]
LOG[Log archive account<br/>CloudTrail S3]
OU1[Workloads OU<br/>Multiple accounts]
OU2[Shared Services OU<br/>Multiple accounts]
end
subgraph Observability[Logging & Monitoring]
CT[CloudTrail]
S3[S3 bucket for logs]
CW[CloudWatch / Alarms]
end
HR --> IDP
IDP --> MGMT
GRC --> IDP
MGMT -->|Assignments + Permission sets| OU1
MGMT -->|Assignments + Permission sets| OU2
CT --> S3
S3 --> SEC
MGMT --> CT
OU1 --> CT
OU2 --> CT
CW --> SEC
8. Prerequisites
AWS account and organization requirements
- An AWS account with permissions to enable and administer AWS IAM Identity Center.
- Recommended for most real deployments: AWS Organizations with a management account and at least one member account.
- If using AWS Control Tower: a Control Tower landing zone typically integrates with IAM Identity Center.
Permissions / IAM roles
You need permissions equivalent to: – Enabling IAM Identity Center – Managing identity sources, users, groups – Creating permission sets and assignments – Reading AWS Organizations account list
Practical guidance: – Use an administrator role in the management account for the lab. – In enterprises, delegate administration via least-privilege roles (verify recommended IAM policies in official docs).
Billing requirements
- IAM Identity Center itself is typically no additional charge, but you may incur costs for:
- AWS Directory Service (if used)
- CloudTrail trails, S3 storage, CloudWatch Logs ingestion
- External IdP licensing (Entra ID/Okta)
- Downstream AWS service usage after access is granted
CLI/SDK/tools needed
- AWS CLI v2 (recommended) for SSO-based CLI authentication
- Install: https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html
- A modern web browser for console access
Region availability
- IAM Identity Center is available in many AWS Regions, but you must choose where to enable it.
- Verify Region support and the “home Region” behavior in official docs before deploying to regulated environments.
Quotas/limits
IAM Identity Center has service quotas (for example number of users/groups, permission sets, assignments, etc.). – Check: – AWS Service Quotas console – IAM Identity Center documentation quotas page (verify in official docs)
Prerequisite services (optional but common)
- AWS CloudTrail for audit logging (at least default event history; for longer retention, configure trails).
- AWS Organizations for multi-account access management.
- External IdP (optional) if you are federating.
9. Pricing / Cost
Current pricing model (high confidence)
- AWS IAM Identity Center has no additional charge for the service itself in typical usage.
- Official pricing context often appears under IAM pricing and/or the IAM Identity Center product pages. Always confirm in the official pages:
- IAM pricing: https://aws.amazon.com/iam/pricing/
- IAM Identity Center product page: https://aws.amazon.com/iam/identity-center/
If your organization uses related AWS services, those services have their own pricing.
Pricing dimensions to consider
Even if IAM Identity Center is “free,” your total cost includes:
-
Identity source cost – Built-in directory: no separate AWS directory hourly charge. – AWS Directory Service (if used): billed per directory/hour and related usage (see AWS Directory Service pricing). – External IdP: subscription/licensing costs are outside AWS.
-
Logging and audit – CloudTrail:
- Default event history is included.
- Additional trails, advanced event selectors, organization trails, and log deliveries can add cost (varies by configuration).
- S3 storage for logs (and retrieval).
- CloudWatch Logs ingestion if you stream logs there.
-
Downstream AWS usage – IAM Identity Center grants access; the actual workloads (EC2, S3, RDS, etc.) create the bulk of cost.
-
Network/data transfer – CloudTrail log delivery and S3 retrieval are typically minimal, but cross-account or cross-Region aggregation can add costs. – End-user sign-in traffic is generally not your main cost driver.
Free tier
- There is not typically a “free tier” concept needed because the service itself is usually no additional charge.
- You still need to watch the cost of connected services (Directory Service, CloudTrail, S3, CloudWatch).
Hidden or indirect costs
- Directory integration: choosing AWS Managed Microsoft AD can become a meaningful recurring cost.
- Operational overhead: time spent managing permission sets, group design, and audits (not a direct bill, but real).
- External IdP: advanced conditional access/MFA features may require higher-tier licenses.
How to optimize cost
- Start with the built-in identity store for small labs and early prototyping.
- Use CloudTrail organization trails only when needed, and tune event selectors carefully.
- Centralize logs in S3 with lifecycle policies (transition to infrequent access/archive classes where appropriate).
- Avoid deploying paid directory infrastructure unless you truly need Windows-integrated AD features.
Example low-cost starter estimate (no fabricated numbers)
A minimal lab can be near-zero incremental cost: – IAM Identity Center: no additional charge – Built-in directory: no additional charge – CloudTrail default event history: included – Costs only occur if you create paid downstream resources (EC2/RDS/etc.) or configure additional paid logging/directory services.
Example production cost considerations
In production, budget for: – External IdP licensing (if used) – Centralized logging (CloudTrail org trail + S3 + optional CloudWatch Logs/SIEM ingestion) – AWS Directory Service (if integrating with AD in AWS) – People/process costs for access reviews and role engineering
For estimates: – Use the AWS Pricing Calculator: https://calculator.aws/#/ – Use service pricing pages for CloudTrail, S3, CloudWatch, Directory Service as applicable.
10. Step-by-Step Hands-On Tutorial
Objective
Set up AWS IAM Identity Center using the built-in Identity Center directory, create a user and group, create a permission set, assign it to an AWS account, and validate access through: – AWS access portal (console) – AWS CLI v2 using SSO login
This lab is designed to be safe and low-cost by avoiding paid directory services and compute resources.
Lab Overview
You will:
1. Enable AWS IAM Identity Center in your AWS environment.
2. Create a group and a test user in the Identity Center directory.
3. Create a ReadOnly permission set.
4. Assign the group to an AWS account using that permission set.
5. Sign in as the test user, open the target account, and validate permissions.
6. Configure AWS CLI v2 with SSO and validate with sts get-caller-identity.
7. Clean up assignments, permission sets, and the test identity objects.
Notes before you begin: – Console pages and labels evolve. If a button/label differs, follow the closest equivalent and verify in official docs. – If you already have IAM Identity Center enabled (common in Control Tower environments), skip enabling and proceed with user/group/permission set steps.
Step 1: Confirm or create an AWS Organization (recommended)
Goal: Ensure you have at least one AWS account where you can assign access. Organizations is recommended for the standard multi-account pattern.
- Sign in to the AWS Management Console as an administrator.
- Open AWS Organizations.
- If you don’t have an organization, create one.
- (Optional but helpful) Create a member account (e.g.,
DevAccount) so you can test cross-account access.
Expected outcome – You have an AWS Organization with a management account. – You have at least one account (management account is enough for the lab, but member account is better).
Verification – In Organizations, confirm you can see the account list.
Common error – If you are not allowed to create an organization, you may be in an AWS environment controlled by someone else (e.g., an enterprise). Use an existing org or coordinate with admins.
Step 2: Enable AWS IAM Identity Center
- In the AWS Console, open AWS IAM Identity Center.
- Choose Enable (or equivalent) to enable IAM Identity Center.
- Select the AWS Region where Identity Center will be enabled (this is often referred to as the “home Region”). Choose carefully for production; for labs, pick your preferred region.
Expected outcome – IAM Identity Center is enabled. – You can access: – Settings (including identity source) – Users / Groups (for the built-in directory) – Permission sets – AWS accounts (if Organizations is connected)
Verification – In IAM Identity Center, locate your AWS access portal URL (often displayed in the dashboard or settings).
Common errors and fixes – You don’t see AWS accounts: Ensure Organizations integration is present. In some setups, a delegated administrator is required. Verify in docs. – Region confusion: If you enabled Identity Center in a region you don’t intend, changing later can be non-trivial. For production, decide early and confirm constraints in official docs.
Step 3: Choose the identity source (built-in directory)
For this lab, use the built-in option to avoid external dependencies.
- In IAM Identity Center, go to Settings (or Identity source).
- Confirm the identity source is set to Identity Center directory (built-in).
Expected outcome – IAM Identity Center will manage users and groups locally for the lab.
Verification – You can open Users and Groups in IAM Identity Center.
Step 4: Create a group
- In IAM Identity Center, open Groups.
- Choose Create group.
- Name it:
Developers - (Optional) Description:
Developer access group for lab
Expected outcome
– A Developers group exists.
Verification – You can open the group details page.
Step 5: Create a test user and add them to the group
- In IAM Identity Center, open Users.
- Choose Add user.
- Create a user, for example:
– Username:
alice– Email: use an email you can access (for initial invite/reset flows) – First/Last name: optional - Save the user.
- Add
aliceto theDevelopersgroup: – OpenDevelopersgroup → Add users – Selectalice
Expected outcome
– User alice exists and is a member of Developers.
Verification
– In the group membership list, confirm alice appears.
Common errors and fixes – Invite/reset email not received: Check spam/junk folders, confirm email address, and verify if your organization blocks automated emails. – Username constraints: Follow the allowed character set enforced by the console.
Step 6: Create a permission set (ReadOnly)
- In IAM Identity Center, open Permission sets.
- Choose Create permission set.
- Choose a permissions option:
– For a lab, select an AWS managed policy option (common choice:
ReadOnlyAccess). - Name it:
ReadOnly - Set session duration as desired (use the default if unsure).
- Create the permission set.
Expected outcome
– A permission set named ReadOnly exists.
Verification – Open the permission set and confirm it includes the intended policy.
Common errors and fixes – Policy not found: AWS managed policies are global but the UI may filter. Use search or select from the list.
Step 7: Assign the permission set to an AWS account
- In IAM Identity Center, open AWS accounts.
- Select the target AWS account:
– Prefer a member account (e.g.,
DevAccount) if available; otherwise use the management account for the lab. - Choose Assign users or groups.
- Select:
– Principal type: Groups
– Group:
Developers - Select the permission set:
–
ReadOnly - Review and Submit.
This triggers provisioning into the target account.
Expected outcome
– The Developers group has access to the selected AWS account with ReadOnly permissions.
– IAM Identity Center provisions an IAM role into the target account.
Verification
– In IAM Identity Center, confirm the assignment shows as created.
– In the target AWS account’s IAM console, you may see a provisioned role created by Identity Center (often prefixed with AWSReservedSSO_...).
Common errors and fixes – Provisioning fails: Common causes include restrictive SCPs, IAM policy limits, or conflicts. Check the provisioning status details and CloudTrail logs. – Assignment doesn’t appear immediately: Wait a few minutes; provisioning is not always instantaneous.
Step 8: Sign in as the test user to the AWS access portal
- Open the AWS access portal URL you noted earlier.
- Sign in as
aliceusing the initial password setup flow (from the email or admin-generated instructions). -
After sign-in, you should see: – The AWS account tile(s) you assigned – The role/permission set option (e.g.,
ReadOnly) -
Click the AWS account, choose the
ReadOnlyrole, and open the AWS Console.
Expected outcome
– alice can open the AWS console in the target account with ReadOnly permissions.
Verification – In the AWS console, open IAM → you should be able to view resources but not create/modify them. – Try a read-only action (e.g., view S3 buckets list) and confirm it works. – Try a write action (e.g., create an S3 bucket) and confirm it is denied.
Common errors and fixes – No accounts show up: Confirm the assignment is correct (group membership, account assignment, permission set). – Access denied unexpectedly: Validate that you picked the correct account and permission set; ensure provisioning completed successfully.
Step 9: Configure AWS CLI v2 to use IAM Identity Center (SSO)
On your local machine (with AWS CLI v2 installed), configure an SSO profile.
- Run:
aws configure sso
-
Answer prompts: – SSO session name: e.g.,
identity-center-lab– SSO start URL: your AWS access portal URL (from Step 2) – SSO region: the region where IAM Identity Center is enabled (home region) – SSO registration scopes: accept default unless you have a specific need – Choose the AWS account and role (permission set) from the interactive list: – Account: your target account – Role:ReadOnly– CLI default region: e.g.,us-east-1(or your preferred) – Default output format:json– Profile name: e.g.,alice-readonly -
Log in:
aws sso login --profile alice-readonly
Expected outcome – Browser-based authentication completes. – CLI caches SSO tokens for the session.
Verification Run:
aws sts get-caller-identity --profile alice-readonly
You should see: – The account ID of the target account – An ARN indicating an assumed role session (SSO-provisioned role)
Common errors and fixes
– Error: The SSO session associated with this profile has expired
Run aws sso login --profile alice-readonly again.
– Start URL/Region mismatch
The SSO region must match where IAM Identity Center is enabled. Re-run aws configure sso.
– CLI v1 installed
Install AWS CLI v2. SSO support is a CLI v2 feature.
Validation
Use these checks to confirm the lab is correct:
-
Portal validation –
alicecan sign in to the AWS access portal – The assigned AWS account appears – TheReadOnlyrole can be launched -
Console authorization validation – Read-only access works (viewing services/resources) – Write operations are denied (expected)
-
CLI validation –
aws sts get-caller-identity --profile alice-readonlysucceeds – Attempt a write operation (e.g., create a bucket) and confirm it fails withAccessDenied
Troubleshooting
Problem: Assignment exists but user can’t see the account in portal
– Confirm alice is in Developers.
– Confirm assignment is for the group (or user) and correct account.
– Confirm provisioning completed successfully (status in IAM Identity Center).
– Sign out fully and sign back in; sometimes cached sessions delay visibility.
Problem: Provisioning failure – Check for restrictive Service Control Policies (SCPs) that block IAM role/policy creation in the target account. – Check IAM policy size/limit issues if you attached large inline policies. – Review CloudTrail events in the management and target accounts.
Problem: CLI “ForbiddenException” or device authorization issues – Ensure system clock is correct. – Ensure you used the correct start URL and SSO region. – If corporate proxy blocks device authorization, test from another network or configure proxy properly.
Problem: User receives MFA prompts / cannot set MFA – MFA depends on identity source and configuration. For external IdPs, MFA is typically enforced there. For the built-in directory, verify supported MFA methods and setup steps in the IAM Identity Center docs.
Cleanup
To avoid leaving unnecessary access paths:
-
Remove account assignment – IAM Identity Center → AWS accounts → select target account – Remove the
Developers→ReadOnlyassignment -
Delete permission set – IAM Identity Center → Permission sets →
ReadOnly→ Delete – If prompted to deprovision from accounts, follow the console steps. -
Delete user and group – Remove
alicefromDevelopers– Delete useralice– Delete groupDevelopers -
Local machine cleanup – Remove the CLI profile from
~/.aws/configand cached SSO tokens if desired. – SSO cache is typically in~/.aws/sso/cache(location can vary; verify in AWS CLI docs).
Disabling IAM Identity Center entirely may not be necessary for a lab and may have side effects, especially in Organizations/Control Tower environments. If you must disable it, verify the current supported disablement process in official docs.
11. Best Practices
Architecture best practices
- Use AWS Organizations and structure accounts by environment and function (e.g., security, logging, shared services, workloads).
- Create standard permission sets mapped to job functions and environments.
- Keep Identity Center in a deliberate home Region and document it; confirm Region constraints early.
IAM/security best practices
- Prefer group-based assignments over user-based assignments.
- Implement least privilege:
- Start from AWS managed policies (like ReadOnlyAccess) only for initial baselines.
- Move to custom managed policies aligned with your platform model.
- Separate permission sets for:
- Read-only auditing
- Developer access (non-prod)
- Production operations (tightly controlled)
- Break-glass admin (rare use, heavily monitored)
- Control privileged access with:
- Strong MFA
- Conditional access policies in the IdP
- Approval workflows outside AWS (ticketing) where required
- Consider SCP guardrails to prevent privilege escalation even if a permission set is overly broad.
Cost best practices
- Avoid paid directory services unless required.
- Right-size CloudTrail and log retention:
- Centralize logs in S3
- Apply lifecycle rules and storage class transitions
- Use the built-in directory for labs/prototypes; adopt external IdP for enterprise scale.
Performance best practices
- Keep permission set count manageable; use a consistent catalog.
- Avoid frequent churn in permission sets that triggers constant re-provisioning.
Reliability best practices
- Maintain at least one break-glass path that is independent of your primary IdP (design carefully; follow your org’s security policy).
- Document IdP outage procedures: who can access AWS and how.
Operations best practices
- Establish an access request and review process:
- Who approves production access
- How long it lasts
- How to revoke quickly
- Monitor provisioning health and investigate failures promptly.
- Standardize naming:
- Permission sets:
JobFunction-Env(e.g.,Developer-Dev,Ops-Prod) - Groups:
aws-<job>-<scope>(e.g.,aws-readonly-all,aws-ops-prod)
Governance/tagging/naming best practices
- Use account metadata (OU placement, account names) to align with access patterns.
- Keep a documented matrix of:
- OUs/accounts
- Groups
- Permission sets
- Intended use and owners
12. Security Considerations
Identity and access model
- IAM Identity Center provides authentication + centralized assignment, but authorization is enforced by IAM in each AWS account.
- Effective permissions are the combination of:
- Permission set policies (role policies)
- SCPs (organization-level guardrails)
- Resource-based policies (e.g., S3 bucket policies)
- Permission boundaries (if used)
- Session policies and conditions
Encryption
- As a managed AWS service, IAM Identity Center uses AWS’s standard service-side encryption controls for stored configuration (verify specifics in AWS docs).
- For logs (CloudTrail → S3), ensure:
- S3 default encryption is enabled (SSE-S3 or SSE-KMS)
- KMS keys are managed with least privilege and rotation policies
Network exposure
- Access portal and AWS console are public endpoints; control access using:
- Strong MFA
- IdP conditional access/device posture
- Restrictive permission sets and SCPs
- Avoid relying exclusively on source IP restrictions unless you have stable egress IPs.
Secrets handling
- Avoid human users generating long-lived access keys.
- Prefer SSO-based CLI access for engineers.
- For automation, use workload roles (not IAM Identity Center users).
Audit/logging
- Enable org-level CloudTrail where appropriate and centralize logs.
- Monitor for:
- Changes to permission sets
- Changes to assignments
- Sign-in events (where available)
- Role assumption patterns in CloudTrail
Compliance considerations
- Demonstrate:
- Strong authentication (MFA)
- Least privilege permission sets
- Periodic access reviews
- Central logging retention and tamper resistance
- For regulated industries, confirm:
- Region/data residency requirements
- Log retention needs
- Separation of duties policies
Common security mistakes
- Over-permissioned permission sets (e.g., broad
AdministratorAccesswidely assigned). - Using user-based assignments everywhere instead of groups.
- Not monitoring provisioning failures (leading to inconsistent access).
- Not implementing SCP guardrails, allowing privilege escalation paths.
- Treating IAM Identity Center as a replacement for IAM governance; it complements IAM, not replaces it.
Secure deployment recommendations
- Use external IdP federation for enterprise workforce access.
- Enforce MFA and conditional access at the IdP.
- Keep a minimal number of highly privileged permission sets.
- Use separate accounts for security/logging and restrict access accordingly.
13. Limitations and Gotchas
These points are common in real deployments; always verify exact current limits and behaviors in official docs.
- Regional “home” configuration: IAM Identity Center is enabled in a chosen Region; moving later can be complex. Decide early.
- Eventual consistency: Permission set updates and provisioning changes may take time to propagate to target accounts.
- Provisioning failures: SCPs or restrictive IAM configurations can block role/policy provisioning.
- Role naming and drift: SSO-provisioned roles follow AWS-managed naming patterns; don’t manually edit them unless you understand the consequences.
- Not for customer identity: IAM Identity Center is workforce identity, not a CIAM service.
- CLI support requires AWS CLI v2: older tooling won’t work.
- External IdP complexity: federation and SCIM provisioning require careful attribute mapping and lifecycle planning.
- Access reviews still required: centralization doesn’t automatically solve governance—process matters.
- Quotas: users, groups, permission sets, assignments, and application integrations have quotas; check Service Quotas/docs.
- Control Tower coupling: in Control Tower environments, changing Identity Center settings can affect account access flows—coordinate with platform owners.
- Break-glass design is non-trivial: ensure you have a resilient emergency access plan that meets your security policy.
14. Comparison with Alternatives
AWS IAM Identity Center is best understood as the workforce SSO and multi-account access layer in AWS. Here’s how it compares to common alternatives.
| Option | Best For | Strengths | Weaknesses | When to Choose |
|---|---|---|---|---|
| AWS IAM Identity Center | Workforce SSO to AWS accounts and assigned apps | Centralized assignments, permission sets, AWS Organizations integration, short-lived sessions | Regional home choice, provisioning complexity, not for customer identity | Standard choice for multi-account workforce access on AWS |
| AWS IAM (roles/users/policies) | Core authorization and workload identity | Fine-grained control, ubiquitous across AWS, supports workloads | Doesn’t provide centralized workforce SSO portal and assignment model by itself | Use always; pair with Identity Center for workforce access |
| Amazon Cognito | Customer identity (app users) | App sign-up/sign-in, federation, tokens for apps | Not designed for AWS account access management | Use for customer-facing apps, not workforce AWS console access |
| AWS Directory Service (Managed Microsoft AD / AD Connector) | Windows-integrated enterprise directory needs | AD compatibility and domain services | Added cost/ops, not a complete SSO assignment layer alone | Use when you require AD integration; often combined with Identity Center |
| Microsoft Entra ID (Azure AD) directly federated to AWS IAM roles | Enterprises standardizing on Entra without Identity Center | Strong conditional access, mature IdP | Managing role mappings across many accounts can get complex without Identity Center patterns | Choose if you prefer direct federation and can manage mapping at scale (many still adopt Identity Center) |
| Okta + direct AWS role federation | Okta-centric enterprises | Strong identity lifecycle and app integrations | Multi-account role mapping can become complex | Choose if you have strong Okta workflows; consider Identity Center for AWS-side governance |
| Google Cloud Identity / Workspace + AWS federation | Google-centric orgs | Central identity | AWS multi-account role mapping complexity | Choose if it matches corporate identity strategy |
| Keycloak (self-managed) | Organizations needing self-hosted IdP | Full control, extensibility | Requires ops, HA, security maintenance | Choose if self-hosting is mandated; still can integrate with AWS/Identity Center where supported |
15. Real-World Example
Enterprise example: regulated multi-account landing zone with external IdP
- Problem
- A financial services company has 120 AWS accounts across dev/test/prod and strict audit requirements.
-
They must enforce MFA, separation of duties, and produce quarterly access review evidence.
-
Proposed architecture
- AWS Organizations with OUs per environment (Prod, NonProd, Security, Shared Services).
- AWS IAM Identity Center enabled in the management account (or delegated admin).
- External IdP federation (e.g., Entra ID) for authentication and MFA.
- Groups in IdP mapped to job functions (
aws-security-audit,aws-ops-prod,aws-dev-nonprod). - Permission sets aligned to roles (ReadOnlyAudit, OpsProd, DeveloperNonProd).
-
Organization CloudTrail trail delivering to S3 in a log archive account, with security tooling in a security account.
-
Why this service was chosen
- Centralized permission set model across many AWS accounts.
- Reduced IAM user sprawl and access key risks.
-
Easier audits: assignments and group membership provide clear evidence.
-
Expected outcomes
- Faster provisioning/deprovisioning tied to IdP lifecycle.
- Reduced number of privileged accounts and credentials.
- Improved audit readiness with centralized logging and repeatable access patterns.
Startup/small-team example: simple SSO for a growing SaaS team
- Problem
- A startup has 6 AWS accounts (prod, staging, dev, security, shared services, sandbox).
-
Founders are doing manual IAM role setup and sharing access instructions.
-
Proposed architecture
- AWS Organizations with basic OU structure.
- IAM Identity Center with built-in directory initially (or lightweight external IdP if already used).
- A small permission set catalog:
ReadOnly,Developer,Admin. -
Group-based assignments:
Developersget Developer in dev/staging, ReadOnly in prod; only founders get Admin. -
Why this service was chosen
- Quick to implement and reduces operational overhead.
- Minimizes long-lived access keys for humans.
-
Scales as the company adds more accounts and teams.
-
Expected outcomes
- Cleaner onboarding (new hires added to groups).
- Reduced risk from shared credentials.
- Clearer access boundaries between production and non-production.
16. FAQ
-
Is AWS IAM Identity Center the same as AWS SSO?
AWS IAM Identity Center is the current name for the service formerly known as AWS Single Sign-On (AWS SSO). Many APIs/CLI commands still use “sso” naming. -
Do I still need AWS IAM if I use IAM Identity Center?
Yes. IAM Identity Center centrally manages access assignments, but IAM roles and policies in each AWS account enforce authorization. -
Does IAM Identity Center create IAM users in each account?
Typically no. It provisions IAM roles in target accounts that users assume via SSO. -
Can I use IAM Identity Center without AWS Organizations?
Some scenarios may work in a single account, but the strongest benefits come from AWS Organizations. Verify current supported modes in official docs. -
Is IAM Identity Center for my customers to log into my app?
No. It is primarily for workforce access to AWS accounts and apps. Use Amazon Cognito or another CIAM solution for customer identity. -
How does MFA work with IAM Identity Center?
If you use an external IdP, MFA is usually enforced in that IdP. If you use the built-in directory, IAM Identity Center supports MFA options—verify currently supported factors in official docs. -
What is a permission set?
A permission set is a centrally managed template that defines the permissions a user/group gets in a target AWS account. It’s provisioned as an IAM role and policies. -
How long does it take for permission changes to apply?
Changes require provisioning and may take minutes to propagate. Treat it as eventually consistent and validate in the target account. -
What are
AWSReservedSSO_roles?
These are IAM roles provisioned into target accounts by IAM Identity Center based on permission sets. -
Can I control session duration?
Yes, session duration is configurable within allowed limits. Verify current min/max constraints in IAM Identity Center docs. -
Can I use AWS CLI with IAM Identity Center?
Yes. Use AWS CLI v2 and configure SSO profiles (aws configure ssoandaws sso login). -
What’s the best practice for assigning access—users or groups?
Prefer groups for scalability and governance, and manage membership in your identity source. -
How do I audit who has access to production accounts?
Review IAM Identity Center assignments (group/user to account/permission set) and group membership in your identity source. Use CloudTrail for activity auditing. -
What happens if my external IdP is down?
Users may not be able to authenticate. Design a break-glass procedure aligned with your security policy (often a separate emergency path). Verify and test. -
Is AWS IAM Identity Center free?
The service itself is typically no additional charge, but related services (Directory Service, CloudTrail trails, S3 log storage, external IdP licensing) can add cost. Confirm on official pricing pages. -
Can I assign access to an entire OU automatically?
IAM Identity Center assignments are to accounts. Many organizations automate account assignment workflows based on OU membership using infrastructure-as-code or automation pipelines (implementation varies). -
Should I give everyone AdministratorAccess via IAM Identity Center?
No. Use least privilege. Reserve admin permission sets for a very small set of operators and use strong guardrails.
17. Top Online Resources to Learn AWS IAM Identity Center
| Resource Type | Name | Why It Is Useful |
|---|---|---|
| Official documentation | IAM Identity Center documentation | Primary source for concepts, configuration steps, and limitations: https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html |
| Official product page | AWS IAM Identity Center product page | High-level overview and positioning: https://aws.amazon.com/iam/identity-center/ |
| Official pricing | IAM pricing | Pricing context (Identity Center is typically no additional charge): https://aws.amazon.com/iam/pricing/ |
| Official CLI docs | AWS CLI SSO docs | Set up and use aws configure sso / aws sso login: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html |
| Official AWS Organizations docs | AWS Organizations User Guide | Needed for multi-account governance: https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html |
| Official CloudTrail docs | AWS CloudTrail User Guide | Auditing for Identity Center and role activity: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-user-guide.html |
| Official architecture guidance | AWS Control Tower documentation | Many landing zones use Identity Center for access: https://docs.aws.amazon.com/controltower/latest/userguide/what-is-control-tower.html |
| Official workshops | AWS Workshops (search IAM Identity Center / IAM) | Hands-on labs (availability varies): https://workshops.aws/ |
| Official videos | AWS YouTube channel | Talks and demos from AWS (search “IAM Identity Center”): https://www.youtube.com/@amazonwebservices |
| Community learning | re:Post (AWS community Q&A) | Practical troubleshooting patterns; validate against docs: https://repost.aws/ |
18. Training and Certification Providers
| Institute | Suitable Audience | Likely Learning Focus | Mode | Website URL |
|---|---|---|---|---|
| DevOpsSchool.com | Beginners to advanced engineers, platform teams | AWS, DevOps, security/IAM fundamentals, operational practices | Check website | https://www.devopsschool.com/ |
| ScmGalaxy.com | Students, engineers, managers | DevOps, SCM, cloud and process-oriented training | Check website | https://www.scmgalaxy.com/ |
| CLoudOpsNow.in | Cloud/ops practitioners | Cloud operations, deployment and operational readiness | Check website | https://www.cloudopsnow.in/ |
| SreSchool.com | SREs, DevOps, operations engineers | Reliability engineering, monitoring, incident response | Check website | https://www.sreschool.com/ |
| AiOpsSchool.com | Ops, SRE, monitoring teams | AIOps concepts, automation, operational analytics | Check website | https://www.aiopsschool.com/ |
19. Top Trainers
| Platform/Site | Likely Specialization | Suitable Audience | Website URL |
|---|---|---|---|
| RajeshKumar.xyz | DevOps/cloud training content (verify specific offerings on site) | Learners seeking guided training resources | https://www.rajeshkumar.xyz/ |
| devopstrainer.in | DevOps training and mentoring (verify catalog on site) | Beginners to intermediate DevOps engineers | https://www.devopstrainer.in/ |
| devopsfreelancer.com | Freelance DevOps consulting/training style offerings (verify) | Teams seeking flexible help or training | https://www.devopsfreelancer.com/ |
| devopssupport.in | DevOps support and training resources (verify) | Engineers needing hands-on support | https://www.devopssupport.in/ |
20. Top Consulting Companies
| Company | Likely Service Area | Where They May Help | Consulting Use Case Examples | Website URL |
|---|---|---|---|---|
| cotocus.com | Cloud/DevOps consulting (verify current services on site) | Cloud architecture, DevOps implementation, automation | Multi-account setup, IAM Identity Center rollout planning, CI/CD + governance integration | https://cotocus.com/ |
| DevOpsSchool.com | Training and consulting (verify current scope on site) | Enablement, workshops, implementation guidance | IAM Identity Center permission set design workshop, operational runbooks, security logging patterns | https://www.devopsschool.com/ |
| DEVOPSCONSULTING.IN | DevOps consulting (verify current services on site) | DevOps transformation, cloud migration support | Landing zone buildout, access management standardization, audit readiness improvements | https://www.devopsconsulting.in/ |
21. Career and Learning Roadmap
What to learn before AWS IAM Identity Center
- AWS fundamentals: accounts, regions, IAM basics
- AWS IAM:
- Policies (identity-based and resource-based)
- Roles and STS
- Permission boundaries and policy evaluation logic
- AWS Organizations:
- OUs, SCPs, account governance
- Identity fundamentals:
- SSO concepts, SAML basics, OIDC basics (high-level)
- MFA and conditional access fundamentals
What to learn after AWS IAM Identity Center
- AWS Control Tower landing zones (if you operate at scale)
- Advanced IAM governance:
- SCP strategies
- IAM Access Analyzer
- Privileged access management patterns
- Centralized logging and detection:
- Organization CloudTrail trails
- Security Lake / SIEM integration (if applicable)
- Infrastructure as Code to manage permission sets and assignments reproducibly (tooling varies; verify current AWS support and providers)
Job roles that use it
- Cloud Engineer / Senior Cloud Engineer
- Solutions Architect / Cloud Architect
- Platform Engineer
- DevOps Engineer / SRE
- Security Engineer / IAM Engineer
- Cloud Operations / Governance, Risk & Compliance (GRC) technologists
Certification path (AWS)
IAM Identity Center is commonly covered indirectly through: – AWS Certified Solutions Architect (Associate/Professional) – AWS Certified Security – Specialty – AWS Certified SysOps Administrator – Associate
Always verify current exam guides: – https://aws.amazon.com/certification/
Project ideas for practice
- Build a mini landing zone: 1 management + 2 member accounts; assign standardized permission sets.
- Implement OU-based governance with SCPs and test that permission sets cannot bypass SCP guardrails.
- Integrate an external IdP (in a sandbox tenant) and test SCIM provisioning and group-based assignments (verify supported integration steps).
- Create a break-glass procedure document and test it in a controlled environment.
- Create an access review report: export assignments and map them to groups and OU/account inventory.
22. Glossary
- AWS IAM Identity Center: AWS service for centrally managing workforce SSO access to AWS accounts and applications (formerly AWS SSO).
- AWS SSO: Legacy name commonly used for IAM Identity Center; also appears in CLI commands and docs URLs.
- AWS Organizations: Service for centrally managing multiple AWS accounts.
- Management account: The primary account in an AWS Organization.
- Member account: Any other account in the organization besides the management account.
- Permission set: A centrally managed set of permissions that IAM Identity Center provisions into AWS accounts as roles/policies.
- Account assignment: Mapping that grants a user/group access to an AWS account via a permission set.
- Identity source: Where users/groups are stored and how authentication is performed (built-in directory or external IdP).
- IdP (Identity Provider): System that authenticates users (e.g., Entra ID, Okta).
- SAML 2.0: Federation protocol commonly used for enterprise SSO.
- OIDC: OpenID Connect, an identity layer on top of OAuth 2.0.
- SCIM: System for Cross-domain Identity Management; often used for automated user/group provisioning from an IdP.
- MFA: Multi-factor authentication.
- STS: AWS Security Token Service; issues temporary credentials for assumed roles.
- SCP: Service Control Policy; organization-level guardrail that limits what accounts can do.
- CloudTrail: AWS service that logs API calls and events for auditing.
23. Summary
AWS IAM Identity Center is AWS’s central service in the Security, identity, and compliance category for managing workforce SSO access to AWS accounts and applications. It replaces scattered IAM user management with a scalable model based on permission sets, group-based assignments, and short-lived role sessions in target AWS accounts.
It matters because it reduces credential risk, standardizes least-privilege access across many accounts, and improves auditability—especially when combined with AWS Organizations, CloudTrail, and an external IdP for MFA and lifecycle management.
Cost-wise, IAM Identity Center is typically no additional charge, but real deployments must budget for identity sources (external IdP or Directory Service) and logging/audit retention (CloudTrail, S3, CloudWatch). Security-wise, focus on least privilege, group-based access, strong MFA/conditional access, SCP guardrails, and a well-defined break-glass procedure.
Use AWS IAM Identity Center when you need centralized workforce access across AWS accounts at scale. Next step: integrate it with AWS Organizations governance (SCPs), implement a permission set catalog aligned to job functions, and operationalize logging and access reviews using CloudTrail and your security tooling.