Setting Up IAM Identity Center Authentication
IAM Identity Center authentication provides a centralized way to manage user access to the AWS DevOps Agent Space web application. This guide explains how to configure IAM Identity Center authentication and manage users.
Prerequisites
Before setting up IAM Identity Center authentication, ensure you have:
IAM Identity Center enabled in your organization or account
Administrator permissions in AWS DevOps Agent
An Agent Space configured or ready to create
Authentication options
AWS DevOps Agent offers two authentication methods for accessing the Agent Space web app:
IAM Identity Center authentication – Recommended for production environments. Provides centralized user management, integration with external identity providers, and sessions up to 12 hours.
Admin access (IAM authentication) – Provides quick access for administrators during initial setup and configuration. Sessions are limited to 30 minutes.
Configuring IAM Identity Center during Agent Space creation
When you create an Agent Space, you can configure IAM Identity Center authentication on the Web app tab:
Step 1: Navigate to the Web app configuration
After configuring your Agent Space details and AWS account access, proceed to the Web app tab
You'll see two sections: "Connect IAM Identity Center" and "Admin access"
Step 2: Configure IAM Identity Center integration
In the Connect [Agent Space] to IAM Identity Center section:
Verify the IAM Identity Center instance – The console displays which Identity Center instance will manage Web App user access (for example,
ssoins-7223a9580931edbe). Your closest IAM Identity Center instance will automatically be pre-populated.Select the IAM Identity Center Application Role Name option – Choose one of three options:
Auto-create a new DevOps Agent role (recommended):
The system automatically creates a new service role with appropriate permissions
This is the simplest option and works for most use cases
Assign an existing role:
Use an existing IAM role that you've already created
The system will verify the role has the required permissions
Choose this option if your organization has pre-created roles for AWS DevOps Agent
Create a new DevOps Agent role using a policy template:
Use the provided policy details to create your own custom role in the IAM Console
Choose this option if you need to customize the role permissions
After clicking Connect, the system automatically:
Creates or configures the specified IAM role
Sets up an IAM Identity Center application for your Agent Space
Establishes trust relationships between IAM Identity Center and the Agent Space web app
Configures OAuth 2.0 authentication flows for secure user access
Alternative: Using admin access
If you want to access the Agent Space web app immediately without setting up IAM Identity Center:
In the Admin access section, note the IAM Role ARN that provides administrator access (for example,
arn:aws:iam::440491339484:role/service-role/DevOpsAgentRole-WebappAdmin-15ppoc42)Click the blue Admin access button to launch the Agent Space web app with IAM authentication
Sessions using this method are limited to 30 minutes
Note
Admin access is intended for initial setup and configuration. For production use and ongoing operations, configure IAM Identity Center authentication.
Adding users and groups
After configuring IAM Identity Center authentication, you need to grant specific users and groups access to the Agent Space web app:
Step 1: Access user management
In the AWS DevOps Agent console, select your Agent Space
Go to the Web app tab
Under User Access, click Manage Users and Groups
Step 2: Add users or groups
Choose Add Users or Groups
Search for users or groups in your IAM Identity Center directory
Select the checkboxes next to the users or groups you want to add
Click Add to grant them access
The selected users can now access the Agent Space web app using their IAM Identity Center credentials.
Working with external identity providers
If you're using an external identity provider (such as Okta, Microsoft Entra ID, or Ping Identity) with IAM Identity Center:
Users and groups are synchronized from your external identity provider to IAM Identity Center
When you add users and groups to the Agent Space web app, you're selecting from the synchronized directory
User attributes and group memberships are maintained by your external identity provider
Changes in your identity provider are automatically reflected in IAM Identity Center after synchronization
How users access the Agent Space web app
After you've added users to your Agent Space:
Share the Agent Space web app URL with authorized users
When users navigate to the URL, they're redirected to the IAM Identity Center login page
After entering their credentials (and completing MFA if configured), they're redirected back to the Agent Space web app
Their session is valid for 8 hours by default (configurable by the Identity Center administrator)
Managing user access
You can update user access at any time:
Adding more users or groups:
Follow the same steps described above to add additional users or groups
Removing access:
In the User Access section, find the user or group to remove
Click the Remove button next to their name
Confirm the removal
Removed users will lose access immediately, but active sessions may continue until they expire.
Session management
IAM Identity Center sessions for the Agent Space web app have the following characteristics:
Default session duration – 8 hours
Session security – HTTP-only cookies for enhanced protection
Multi-factor authentication – Supported when configured in IAM Identity Center
API credentials – Short-duration (15-minute) SigV4 credentials are issued for API calls and renewed automatically
To configure session duration:
Navigate to the IAM Identity Center console
Go to Settings > Authentication
Under Session duration, configure your preferred duration (from 1 hour to 12 hours)
Choose Save changes
Disconnecting Identity Center
In your Agent Space’s console, click Actions in the top-right and select Disconnect from IAM Identity Center
Confirm in confirmation dialog