IAM Identity Center
Progress checklist
IAM Identity Center
IAM Identity Center (formerly AWS SSO) — centralised identity and access for AWS and applications, with SSO and OIDC; used for human and GitOps (e.g. ArgoCD) access. (formerly AWS SSO
Single Sign-On — one login for multiple apps or services; IAM Identity Center and other IdPs use SSO so you sign in once to access AWS or Git. ) gives you centralised user management, single sign-on, and short-lived credentials — instead of long-lived access keys tied to an IAM user.
Why use it:
- Avoids long-lived IAM user access keys and passwords.
- Built-in MFA and optional federated login.
- Free for internal users; scalable and audit-friendly.
- Required for the Platform batch: ArgoCD uses OIDC
OpenID Connect — the federation protocol EKS uses to link IAM roles to Kubernetes service accounts (IRSA). + IAM Identity Center to get temporary credentials when syncing from Git (no static keys stored anywhere).
You need one-time root (or admin) access to enable IAM Identity Center; MFA on the root user is recommended (see AWS Account).
-
Enable IAM Identity Center. Recommended / Required for ArgoCD
In the AWS Console, search for IAM Identity Center (or find it under Security, Identity & Compliance).
- Click Enable
- On the identity source prompt, keep the default: Identity Center directory (unless you already have an external IdP such as Okta or Azure AD — in that case connect it here)
- Choose the same region you selected in the AWS Account step. IAM Identity Center is a regional service; the region you enable it in is where the service runs
-
Create a user in the Identity Center directory.
In IAM Identity Center:
- Left nav: Users → Add user
- Enter a username and email address (e.g. name
Adminand your email) - Fill in first name, last name
- Leave Send an email to the user with password setup instructions checked — you’ll receive an activation email
- Click Add user
Check your email and complete the account activation (set a password and configure MFA for the Identity Center user too).
-
Create a group (optional but recommended).
Groups let you assign permission sets to multiple users at once — useful if you add collaborators later.
- Left nav: Groups → Create group
- Name it (e.g.
AdminsorEKS-Walkthrough) - Add your user to the group
-
Create a permission set.
A permission set defines what the user (or group) can do in an account.
- Left nav: Permission sets → Create permission set
- Choose Predefined permission set → AdministratorAccess (for the walkthrough; scope it down for production use)
- Accept defaults for session duration (1 hour is fine; extend to 8 hours if your Terraform runs take longer)
- Name it (e.g.
AdministratorAccess) and create it
-
Assign the user (or group) to the AWS account.
- Left nav: AWS accounts → select your account from the list
- Click Assign users or groups
- Choose your user (or group) → Next
- Choose the permission set you just created → Next → Submit
Wait a moment for the assignment to apply.
-
Verify console access (optional but recommended).
In IAM Identity Center → Settings, copy the Access portal URL (e.g.
https://d-xxxxxxxxxx.awsapps.com/start). Open it in a browser, sign in with the Identity Center user you created, and click Management Console for your account to confirm access. -
Configure the AWS CLI to use IAM Identity Center. Required if using SSO
Requires AWS CLI v2 (see AWS CLI to install). After the CLI is installed, run:
Terminal window aws configure ssoYou’ll be asked for:
- SSO session name — any name (e.g.
my-sso) - SSO start URL — find this in IAM Identity Center → Settings → Identity Center instance ARN / Access portal URL (looks like
https://d-xxxxxxxxxx.awsapps.com/start) - SSO region — the region where you enabled IAM Identity Center (e.g.
ap-southeast-6) - SSO registration scopes — press Enter to accept the default (
sso:account:access) - A browser opens for you to sign in and approve access
- Back in the terminal: choose the account and permission set, then set a profile name (e.g.
eks-walkthrough) - Default client Region — use the same region as your SSO region (e.g.
ap-southeast-6) - Default output format:
json
- SSO session name — any name (e.g.
-
Log in and verify.
Terminal window aws sso login --profile eks-walkthroughaws sts get-caller-identity --profile eks-walkthroughThe output should show your account ID and a role ARN from IAM Identity Center (not an IAM user ARN).
Optional: harden the setup
Section titled “Optional: harden the setup”- MFA in IAM Identity Center — In IAM Identity Center → Settings → Multi-factor authentication, require MFA for all users.
- CloudTrail — In CloudTrail, create a trail for management events (free tier applies).
- Root access keys — If any root access keys exist, remove them in IAM. Use the root account only for rare account-level tasks.
Next step
Section titled “Next step”Continue to AWS CLI to install the CLI and confirm your credentials work.