Configuring a firewall, proxy server, or data perimeter for Amazon Q Developer
If you're using a firewall, proxy server, or data perimeter
General URLs to allowlist
In the following URLs, replace:
-
idc-directory-id-or-alias
with your IAM Identity Center instance's directory ID or alias. For more information about IAM Identity Center, see What is IAM Identity Center? in the AWS IAM Identity Center User Guide. -
sso-region
with the AWS Region where your IAM Identity Center instance is enabled. For more information, see IAM Identity Center Regions supported by Amazon Q Developer. -
profile-region
with the AWS Region where your Amazon Q Developer profile is installed. For more information about the Amazon Q Developer profile, see What is the Amazon Q Developer profile? and Supported Regions for the Q Developer console and Q Developer profile.
URL | Purpose |
---|---|
|
Authentication |
|
Authentication |
|
Authentication |
|
Authentication |
|
Authentication |
|
Authentication |
|
Authentication |
|
Authentication |
|
Amazon Q Developer features |
|
Amazon Q Developer features |
|
Amazon Q Developer in the IDE, configuration |
|
Amazon Q Developer in the IDE, endpoints |
|
Amazon Q Developer in the IDE, endpoints |
|
Amazon Q Developer in the IDE, language processing |
|
Amazon Q Developer in the IDE, language processing |
|
Amazon Q Developer in the IDE, telemetry |
|
Amazon Q Developer in the IDE, telemetry |
Amazon S3 bucket URLs and ARNs to allowlist
For some features, Amazon Q uploads artifacts to AWS service-owned Amazon S3 buckets. If you are using data perimeters to control access to Amazon S3 in your environment, you might need to explicitly allow access to these buckets to use the corresponding Amazon Q features.
The following table lists the URL and ARN of each of the Amazon S3 buckets that Amazon Q requires access to, and the features that use each bucket. You can use the bucket URL or bucket ARN to allowlist these buckets, depending on how you control access to Amazon S3.
You only need to allowlist the bucket in the AWS Region where the Amazon Q Developer profile is installed. For more information about the Amazon Q Developer profile, see What is the Amazon Q Developer profile?.
Amazon S3 bucket URL and ARN | Purpose |
---|---|
US East (N. Virginia):
Europe (Frankfurt):
|
An Amazon S3 bucket used to upload artifacts for Amazon Q code reviews |
US East (N. Virginia):
Europe (Frankfurt):
|
An Amazon S3 bucket used to upload artifacts for the Amazon Q Developer Agent for code transformation |
US East (N. Virginia):
Europe (Frankfurt): NoteA URL and ARN are not available for the Europe (Frankfurt) Region. As a workaround, tell users to use the agentic chat feature for their software development needs. |
An Amazon S3 bucket used to upload artifacts for the Amazon Q Developer Agent for software development |
US East (N. Virginia):
Europe (Frankfurt):
|
An Amazon S3 bucket used to upload artifacts for the Amazon Q Developer Agent for unit test generation |
Configuring a corporate proxy in Amazon Q
If your end users are working behind a corporate proxy, have them complete the following steps to successfully connect to Amazon Q.
Step 1: Configuring proxy settings in your IDE
Specify your proxy server's URL in your IDE.
Note
You must configure an HTTP or HTTPS proxy. SOCKS proxies are not supported.
Step 2: Configuring SSL certificate handling
Amazon Q automatically detects and uses the trusted certificates installed on your system. If you are experiencing certificate errors, you must manually specify a certificate bundle by completing the following procedure.
Note
The following are situations where manual configuration is required.
-
You are encountering certificate-related errors after configuring the proxy.
-
Your corporate proxy uses certificates that aren't in your system's trust store.
-
Amazon Q fails to automatically detect your corporate certificates.
Step 3: Restart your IDE
You must restart your IDE in order to update Amazon Q with your changes.
Troubleshooting
If you completed the procedures in the previous sections and you are still experiencing issues, use the following instructions to troubleshoot.
Getting your corporate certificate
To obtain your corporate certificate, ask your IT team for the following information:
-
Your corporate certificate bundle, which is typically a
.pem
or.crt
file. -
Your proxy server details, including your host name, port, and authentication method.
Or, export the certificate from your browser:
-
Visit any HTTPS site on your corporate domain.
-
Near the address bar, choose the lock icon or a similar icon. (The icon differs depending your browser vendor.)
-
Export the root certificate to a file. Make sure you include the whole certificate chain. The steps to export the root certificate will be slightly different depending on the browser you're using. Consult your browser's documentation for detailed steps.