SAABlog
SecurityIntermediate

AWS IAM Identity Center (SSO): Centralized Multi-Account SSO Management

Learn how to configure SSO for multiple AWS accounts and business apps with AWS IAM Identity Center and centrally manage permissions.

PHILOLAMB-Updated: January 31, 2026
IAM Identity CenterSSOSAMLPermission SetsMulti-Account

Related Exam Domains

  • Domain 1: Design Secure Architectures

Key Takeaway

IAM Identity Center is a free service that centrally manages SSO (Single Sign-On) to multiple AWS accounts and business apps. Integrated with Organizations, it controls access to all member accounts from a single portal.

Exam Tip

Exam Essential: "Multi-account SSO + centralized permission management = IAM Identity Center (formerly AWS SSO)"

What is IAM Identity Center?

A service that provides SSO to multiple AWS accounts and business applications within AWS Organizations.

┌──────────────────────────────────────────────┐
│           IAM Identity Center                 │
│                                               │
│  [SSO Portal] ← User logs in once             │
│       │                                       │
│       ├── AWS Account A (Prod)  → Permission Set A    │
│       ├── AWS Account B (Dev)   → Permission Set B    │
│       ├── AWS Account C (Test)  → Permission Set C    │
│       ├── Salesforce            → SAML integration    │
│       └── Slack                 → SAML integration    │
└──────────────────────────────────────────────┘

Key Features

FeatureDescription
FreeNo additional cost
Organizations IntegrationAuto-connect all member accounts
SSO PortalSingle URL for all accounts/apps
Permission SetsAssign different permissions per account
CLI v2 Supportaws sso login for CLI authentication

IAM Identity Center vs Cognito

ComparisonIAM Identity CenterAmazon Cognito
Target UsersEmployees (Enterprise)Customers/App users (B2C)
PurposeSSO to AWS accounts/appsApp login/signup
IdP IntegrationAD, Okta, Entra IDGoogle, Facebook, SAML
ResultAWS Console/CLI accessJWT token issuance
CostFreeUsage-based pricing
Account ScopeMulti AWS accountsSingle app

Exam Tip

Selection Criteria: "Employees SSO to AWS Console" → IAM Identity Center, "App users logging in" → Cognito

Core Components

1. Identity Source

Configure where to get user information from.

Identity SourceDescriptionUse Case
Identity Center DirectoryBuilt-in user storeSmall scale, no separate IdP
Active DirectoryAWS Managed AD or AD ConnectorExisting AD environment
External IdPOkta, Entra ID, OneLoginSAML 2.0 / SCIM

2. Permission Sets

A bundle of IAM policies to use in AWS accounts.

Permission Set Examples:

AdminAccess (Permission Set)
├── AWS Managed Policy: AdministratorAccess
└── Session Duration: 4 hours

ReadOnlyAccess (Permission Set)
├── AWS Managed Policy: ViewOnlyAccess
├── Inline Policy: S3 read-only
└── Session Duration: 1 hour

DevOpsAccess (Permission Set)
├── AWS Managed Policy: PowerUserAccess
├── Permissions Boundary: DevOpsBoundary
└── Session Duration: 8 hours

3. Assignments

Connect users/groups + permission sets + AWS accounts.

Assignment Examples:

DevOps Group:
├── Prod Account → ReadOnlyAccess
├── Dev Account  → AdminAccess
└── Test Account → AdminAccess

Finance Group:
├── Billing Account → BillingAccess
└── Prod Account    → ReadOnlyAccess

How It Works

SSO Login Flow

1. User → SSO Portal (https://d-xxxxxxxxxx.awsapps.com/start)
2. Login (authenticated by identity source)
3. Portal displays accessible accounts/apps list
4. Select account + permission set
5. Access AWS Console (temporary credentials auto-issued)

CLI v2 SSO Flow

# Configure SSO profile
aws configure sso
# SSO login
aws sso login --profile my-dev
# Execute command with SSO credentials
aws s3 ls --profile my-dev

External IdP Integration

SAML 2.0 Integration

[External IdP (Okta/Entra ID)]
        │
        │ SAML 2.0
        ▼
[IAM Identity Center]
        │
        ├── AWS Account A
        ├── AWS Account B
        └── Business Apps

SCIM Auto-Provisioning

SCIM (System for Cross-domain Identity Management) automatically syncs users/groups.

AspectManual ManagementSCIM Provisioning
User CreationManual on both sidesAuto-sync from IdP
Group SyncManual mappingAuto-sync
User DeactivationManual on both sidesAuto-reflected when disabled in IdP

Exam Tip

SCIM: User/group changes in external IdP are automatically reflected in IAM Identity Center.

Fine-Grained Permission Management

ABAC (Attribute-Based Access Control)

Control access based on user attributes (department, job title, etc.).

User Attributes:
- Department: Engineering
- CostCenter: 1234

Permission Set Condition:
{
  "Condition": {
    "StringEquals": {
      "aws:PrincipalTag/Department": "Engineering"
    }
  }
}
→ Only Engineering department users can access specific resources

SAA-C03 Exam Focus Points

  1. Service Selection: "Multi-account SSO = IAM Identity Center"
  2. vs Cognito: "Employees = Identity Center, App users = Cognito"
  3. Organizations Required: "Identity Center is used with Organizations"
  4. Free: "No additional cost"
  5. Permission Sets: "Can assign different permissions per account"

Exam Tip

Sample Exam Question: "100 developers need SSO access to 10 AWS accounts. Different permissions are needed per account. What is the most appropriate service?" → Answer: IAM Identity Center (manage per-account permissions with permission sets)

Frequently Asked Questions (FAQ)

Q: Can IAM Identity Center be used without Organizations?

Single-account mode is available, but using with Organizations is recommended to leverage multi-account SSO benefits.

Q: What's the difference between IAM Identity Center and IAM Federation (direct SAML)?

IAM Federation requires individual setup per account, while Identity Center applies SSO to all accounts with one setup. Identity Center is much more efficient in multi-account environments.

Q: I'm using AWS SSO. Do I need to migrate to IAM Identity Center?

AWS SSO was renamed to IAM Identity Center. Your existing settings are preserved, and no additional migration is required.

Q: How many permission sets can I create?

You can assign up to 50 permission sets per AWS account, and create up to 2,000 across the entire organization.

Q: Does IAM Identity Center support MFA?

Yes. Built-in MFA is supported, including TOTP (authenticator apps), FIDO2 security keys, and built-in authenticators. When using external IdPs, you can leverage their MFA.

References