Software Alternatives, Accelerators & Startups

Amazon SSO

Manage access to multiple AWS accounts & business apps.

Amazon SSO Reviews and details

Screenshots and images

  • Amazon SSO Landing page
    Landing page //
    2023-04-17

Features & Specs

  1. Centralized Access Management

    Amazon SSO allows centralized management of access across AWS services and accounts, making it easier to enforce security policies and reduce the complexity of managing credentials separately for each account or service.

  2. Integration with AWS Services

    Integrated seamlessly with AWS services, Amazon SSO simplifies the setup and management of access control for resources in AWS, ensuring consistent security across the platform.

  3. Support for Third-Party Applications

    Amazon SSO can be used to manage access not just for AWS resources, but also for external applications, including SaaS services that support SAML 2.0, allowing for broader use within an organization.

  4. Improved User Experience

    By leveraging single sign-on technology, users benefit from a simplified login process, reducing the number of credentials they need to manage and improving productivity.

  5. Enhanced Security

    Centralized SSO provides higher security through consistent application of policies, reduced password fatigue among users, and decreased likelihood of phishing attacks due to fewer login points.

Badges & Trophies

Promote Amazon SSO. You can add any of these badges on your website.

SaaSHub badge
Show embed code
SaaSHub badge
Show embed code

Videos

We don't have any videos for Amazon SSO yet.

Social recommendations and mentions

We have tracked the following product recommendations or mentions on various public social media platforms and blogs. They can help you see what people think about Amazon SSO and what they use it for.
  • Building an Application as a Beta User of the Low-Code Solution 'AWS App Studio': Cons (Part 2 of 2)
    After completing the IAM Identity Center setup, I created an App Studio instance. I added the IAM Group and User created in AWS IAM Identity Center to the "Administrator Group" and initiated instance creation. However, the process of creating the App Studio instance took a very long time. - Source: dev.to / 3 months ago
  • Migrating AWS Organizations: How I Did It and Why
    Then, AWS Identity Center (previously called SSO) came along, and I wanted to enable it. However, I didn't want to do it in my old, disorganized setup, as I knew it would only make it harder to align with AWS best practices in the future. So, I kept postponing it. - Source: dev.to / 6 months ago
  • Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 2
    AWS IAM Identity Center (Successor to AWS Single Sign-On): helps you securely create or connect your workforce identities and manage their access centrally across AWS accounts and applications. - Source: dev.to / 8 months ago
  • Setting up AWS IAM Identity Center as an identity provider for Confluence
    AWS IAM Identity Center is a great tool for managing access to multiple AWS accounts in one centralized location. Users can assume roles in the AWS accounts they have access to and work in the AWS console or CLI. - Source: dev.to / 11 months ago
  • My personal AWS account setup - IAM Identity Center, temporary credentials and sandbox account
    I'm sure AWS IAM user management was great when it first launched. Now, AWS IAM Identity Center has more features and is easier to use. For example, it provides an easy-to-use interface to access all accounts and roles. Or it has improved MFA capabilities, such as support for Apple's TouchID. That is why I chose AWS Identity Center. It is set up in the AWS Organizations root account and connects to all accounts in... - Source: dev.to / 12 months ago
  • How to Improve Your Security Posture in Just a Few Clicks with AWS IAM Access Analyzer
    After observing the findings in an environment using AWS IAM Identity Center (formerly AWS SSO) to manage identities and access, we can see that we have a lot of findings related to the IAM Identity Center roles and the SAML provider which the IAM IC creates in each account. The Access analyzer considers these SAML providers external to the Organization because theoretically you could federate with Identity... - Source: dev.to / about 1 year ago
  • AWS Users, Roles, and Identity Center Demystified
    Human users using Roles can leverage IAM Identity Center (formerly AWS SSO) which offers a pretty good experience, whether we're federating from Active Directory (a popular choice for enterprises) or managing users within Identity Center (fine for individuals or small team). We get an easy console sign-in experience and similarly frictionless command line access. - Source: dev.to / almost 2 years ago
  • Make desktop application prompt for IAM username and password?
    I would highly recommend not using IAM directly for this. Managing it will be an exercise in pain and suffering. At the very least, set up IAM Identity Center and tie it into your org IdP (or just provision users within IAM IC). The user experience of signing in and using this is so much better than legacy IAM users. You'll be able to create a permission set with the required privileges and then assign that to... Source: about 2 years ago
  • DevSecOps with AWS – ChatOps with AWS and AWS Developer Tools – Part 1
    AWS IAM Identity Center (Successor to AWS Single Sign-On): helps you securely create or connect your workforce identities and manage their access centrally across AWS accounts and applications. - Source: dev.to / about 2 years ago
  • AWS SSO & GitHub OpenID Connect Setup
    Since we plan to have multiple AWS accounts, we need to manage access to each of them. The AWS Identity Center enables you to create and manage AWS users, groups, and permissions to grant or deny access to AWS resources across AWS accounts in your organizations. - Source: dev.to / about 2 years ago
  • Easy as SSO tooling with Granted AWS
    No doubt about it, AWS SSO (or should I say IAM Identity Centre?) is a great addition to the overall access management and security in AWS. But, as you mature in the cloud with a touch of AWS Organizations and dash of well-architected framework you'll soon have many AWS accounts and managing all of those accounts kind of sucks. - Source: dev.to / about 2 years ago
  • IAM Best Practices [cheat sheet included]
    For human users, the best credentials are short-lived, and ones that no human ever sees or knows. This is entirely achievable thanks to identity providers such as AWS IAM Identity Center, or Google Cloud Identity. You can also sync a trusted external ID source like Okta Universal Directory, Microsoft Active Domain, or any open-source SAML-based system to get the same result. - Source: dev.to / over 2 years ago
  • Is there a reason to use AWS IAM over AWS IAM Identity Center for the management of multiple account setup?
    These are one in the same (SSO was renamed): https://aws.amazon.com/iam/identity-center/. Source: over 2 years ago
  • Uncomplicating cloud security — IAM (Part 2)
    AWS recommends using IAM Identity Center for organizations or any size and type. What is more likely going to be the case though is that you are only going to find the need for it once you get into the multi-AWS account world. The service provides a comprehensive management layer built on top of the Identity provider which allows for seamless permissions and identity management across accounts and applications. - Source: dev.to / over 2 years ago
  • DevSecOps with AWS - Multi Environment deployments - Part 2
    AWS IAM Identity Center (Successor to AWS Single Sign-On): helps you securely create or connect your workforce identities and manage their access centrally across AWS accounts and applications. - Source: dev.to / over 2 years ago
  • Use IAM Identity Center (AWS SSO) to protect your Cloudfront served application
    You might have set-up your AWS Accounts using Control Tower with Organizations and are managing your members using IAM Identity Center (Successor to AWS Single-Sign-On). Or you are using AWS Identity Center as a standalone tool to centralize your SSO credentials for 3rd party applications. - Source: dev.to / over 2 years ago
  • Managing AWS at scale; multi-account strategy
    Since you are going down the route of having a lot of accounts, a way of managing access to these is key. AWS provides their AWS IAM Identity Center (AWS Single Sign-On) to help you with this task. - Source: dev.to / over 2 years ago
  • AWS Deep Racer Event Hosting — Setup
    To make use of multi-user mode only a single AWS Account is required. Within that account each user requires the ability to access that account, with appropriate permissions. Options include an IAM user within that account, or if you’re operating this within an enterprise environment you could assume a role within the account, for example via using AWS Identity Centre (formerly known as Single Sign-On).... - Source: dev.to / over 2 years ago
  • Using multiple profiles with AWS-CLI
    Assume_role = arn:aws:iam::your-prod-aws-account:role/dev-prod-role This reduces the number of IAM keys you need to manage and worry about rotating. The IAM key for default should only have permissions to assume into other roles. The second suggestion is to look at using AWS SSO (now called AWS Identity Center[1]). This replaces long-lived keys on your machine, and instead you authenticate through AWS SSO to get a... - Source: Hacker News / over 2 years ago
  • Think AWS, Think Security
    Use AWS Single Sign-on/AWS IAM Identity Centre Provide users with single sign-on access to all of their assigned Amazon Web Services (AWS) accounts and business apps from a single location with the help of AWS SSO, which makes it simple to centrally manage access to several AWS accounts and business applications. AWS SSO is tightly integrated with AWS Organizations, and runs in your AWS Organizations management... - Source: dev.to / almost 3 years ago
  • Build a Multi-Account Management Environment with AWS Control Tower
    AWS Control Tower is a service that allows you to build a secure AWS multi-account management environment. Since AWS Organizations and AWS SSO are set up automatically, it is easier than manually creating accounts. I have used this service at my company and found it convenient, so I decided to use it for my account this time. In my account, I have additionally built and managed production, staging, development,... - Source: dev.to / almost 3 years ago

External sources with reviews and comparisons of Amazon SSO

Top 5 Dynobase alternatives you should know about - March 2025 Review
Dynomate offers a comprehensive solution with native AWS SSO support, advanced multi-tab functionality, and Git-based collaboration features. NoSQL Workbench is a valuable free tool from AWS, excellent for designing and visualizing data models. The JetBrains DynamoDB Plugin brings DynamoDB into your IDE with helpful autocomplete and query-saving features.
7 Best SSO Tools for 2023
Currently, AWS SSO supports SAML 2.0 ldP, AWS SSO, and Active Directory for identity sources. On the backend, administrators can manage users permissions centrally sorting through AWS accounts, AWS apps, or SAML-enabled applications. I do not like the backend AWS interface and found it tougher to navigate. However, after some with the product, I was able to catch on eventually. However, therein. It is room for...

Do you know an article comparing Amazon SSO to other products?
Suggest a link to a post with product alternatives.

Suggest an article

Amazon SSO discussion

Log in or Post with

This is an informative page about Amazon SSO. You can review and discuss the product here. The primary details have not been verified within the last quarter, and they might be outdated. If you think we are missing something, please use the means on this page to comment or suggest changes. All reviews and comments are highly encouranged and appreciated as they help everyone in the community to make an informed choice. Please always be kind and objective when evaluating a product and sharing your opinion.