- Newest
- Most votes
- Most comments
Amazon CodeCatalyst does not currently support SSO. I have raised a feature request with the service team on your behalf. While I am unable to comment on when this feature may get released, I request you to keep an eye on our What's New and Blog pages for any new feature announcements. Here is the documentation on how you can signup for Codecatalyst and invite your project team members to collaborate on your project.
This feature is now released : https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-codecatalyst-single-sign-on-aws-iam-identity-center/
... and it only mostly works. I've tried several times to setup a new Space with IAM Identity Center SSO and I keep landing on the "Review and complete" page with "ValidationException: Invalid request parameters" and no further explanation why it's failing. Really not earning customer trust here.
@sh4m1l65 if it helps at all I kept getting this when I was trying to do code catalyst cross account and cross region from the account that actually had iam identity center setup, when i tried in the account that had iam identity center (still cross region) it worked fine
Relevant content
- asked a year ago
- AWS OFFICIALUpdated 2 years ago

I raised this concern in person at re:Invent, and it sounds like it's already being considered. A very closely related issue is that IAM roles are assigned at the space/project level, so actions taken in CodeCatalyst do not tie back to the Builder ID of the person who initiated them. I understand that Builder ID is meant to be separate from accounts and organizations, but if that decouples the identity of a user from the actions they take, it makes audits difficult.