

# Amazon Q Developer Pro subscriptions
Pro tier subscriptions

An *Amazon Q Developer Pro subscription*, also called a *Pro tier subscription*, is a paid version of the Amazon Q Developer service. It offers enhanced AI development capabilities designed for professional developers and teams who require advanced features and higher usage limits beyond the Free tier offering. For more information about pricing tiers and feature availability, see the [Amazon Q Developer pricing page](https://aws.amazon.com/q/developer/pricing/).

This chapter covers essential information for managing Amazon Q Developer Pro subscriptions for both personal accounts (Builder IDs) and workforce users (IAM Identity Center). It describes Region availability and support, billing details, and subscription status information. It also provides step-by-step guidance for key tasks such as unsubscribing, and upgrading to the Pro tier.

**Topics**
+ [

# Amazon Q Developer Pro Region support
](q-admin-setup-subscribe-regions.md)
+ [

# Amazon Q Developer Pro subscription billing
](tracking-across-org-cost-usage.md)
+ [

# Amazon Q Developer subscription statuses
](q-admin-setup-subscribe-status.md)
+ [

# Finding the Start URL for use with Amazon Q Developer
](manage-account-details.md)
+ [

# Managing the encryption method in Amazon Q Developer
](manage-encryption.md)
+ [

# What is the Amazon Q Developer profile?
](subscribe-understanding-profile.md)
+ [

# Troubleshooting Amazon Q Developer Pro subscriptions
](q-admin-setup-subscribe-troubleshooting.md)
+ [

# Viewing an aggregated list of Amazon Q Developer subscriptions
](subscribe-visibility.md)
+ [

# Unsubscribing from Amazon Q Developer Pro
](q-admin-setup-unsubscribe.md)
+ [

# Upgrading to Amazon Q Developer Pro
](upgrade-to-pro.md)

# Amazon Q Developer Pro Region support
Supported Regions

Region information for the Pro tier varies depending on whether you're an end-user with a personal account (Builder ID), or you're an administrator of IAM Identity Center workforce users.

## Personal account (Builder ID) users


If you're the owner of a personal account (Builder ID), your Pro tier subscription is supported in the following Region:
+ US East (N. Virginia)

## IAM Identity Center workforce users


Read this section if you're an administrator of IAM Identity Center workforce users.

**Topics**
+ [

### IAM Identity Center Regions supported by Amazon Q Developer
](#pro-subscription-regions)
+ [

### Supported Regions for the Q Developer console and Q Developer profile
](#qdev-console-and-profile-regions)
+ [

### Subscribing users to Amazon Q Developer Pro across AWS Regions
](#subscribe-multi-region)

### IAM Identity Center Regions supported by Amazon Q Developer


The workforce users that you want to subscribe to Amazon Q Developer Pro must have identities in an IAM Identity Center instance (or a connected identity provider) in one of the Regions listed on the [Supported Regions page](regions.md#default-regions), except for opt-in Regions. If your users have identities in an IAM Identity Center instance in an opt-in Region, they can't be subscribed, which means they will only have access to the Free tier [in the AWS Management Console, and on AWS apps and websites](q-on-aws.md), and they won’t have access to Amazon Q in the IDE or at the command line.

Amazon Q stores the subscriptions of IAM Identity Center workforce users in the same Region as your IAM Identity Center instance.

Regardless of the IAM Identity Center Region, data is stored in the Region where you create the Amazon Q Developer profile.

For more information about Amazon Q Developer profiles, see [What is the Amazon Q Developer profile?](subscribe-understanding-profile.md).

For more information about data protection, see [Data protection in Amazon Q Developer](data-protection.md).

### Supported Regions for the Q Developer console and Q Developer profile


The **Amazon Q Developer console** and **Amazon Q Developer profile** are supported in the following Regions:
+ US East (N. Virginia)
+ Europe (Frankfurt)

For more information about the Amazon Q Developer profile, see [What is the Amazon Q Developer profile?](subscribe-understanding-profile.md). 

**Note**  
The following features aren’t supported for Q Developer profiles created in the Europe (Frankfurt) Region:  
[Chatting with Support](support-chat.md)
[Troubleshooting resources with Amazon Q](chat-actions-troubleshooting.md)
[.NET transformations in the IDE](transform-dotnet-IDE.md)
[Amazon Q in chat applications (for Slack)](q-in-chat-applications.md)
Amazon Q in the AWS Console Mobile Application
[GitLab Duo with Amazon Q](gitlab-with-amazon-q.md)
[Amazon Q for GitHub](amazon-q-for-github.md)

### Subscribing users to Amazon Q Developer Pro across AWS Regions
Multi-Region subscription scenario

When you subscribe an IAM Identity Center workforce user to Amazon Q Developer Pro, you might need to work in two different AWS Regions:
+ One Region for the IAM Identity Center instance (where user identities are managed, and where subscriptions are stored)
+ Another Region for the Amazon Q Developer console (where the [Amazon Q Developer profile](subscribe-understanding-profile.md), customizations, and subscriptions are managed)

The Regions are not always the same because the Amazon Q Developer console is supported in fewer Regions than IAM Identity Center.

In a scenario where your IAM Identity Center is in a different Region from your Amazon Q Developer console, use the guidance in the following example to subscribe users.

#### Example subscription process in a multi-Region scenario


Let's walk through subscribing a user where:
+ The IAM Identity Center instance is in **US West (N. California)**.
+ The Amazon Q Developer console is in **US East (N. Virginia)**. This is the closest Region to the IAM Identity Center instance that the Amazon Q Developer console supports. 

**To subscribe the user**

1. Add the user in your IAM Identity Center instance in **US West (N. California)**.

1. Switch to the Amazon Q Developer console in the **US East (N. Virginia)**.

1. Subscribe the user through the Amazon Q Developer console in **US East (N. Virginia)**.

Upon being subscribed:
+ The user's subscription is created in **US West (N. California)**.
+ The user's subscription is associated with their user entry in **US West (N. California)**.
+ The user's subscription is associated with the Amazon Q Developer profile in **US East (N. Virginia)**.

Additionally, any data that Amazon Q Developer needs to store on the user's behalf will be stored in **US East (N. Virginia)**. For more information about data storage and security, see [Encryption at rest](data-encryption.md#encryption-rest).

For detailed instructions on subscribing users, see [Getting started with IAM Identity Center](getting-started-idc.md).

# Amazon Q Developer Pro subscription billing
Subscription billing

Billing information for the Pro tier varies depending on whether you're an end-user with a personal account (Builder ID), or you're an administrator of IAM Identity Center workforce users.

## Personal account (Builder ID) users


If you subscribed to the Pro tier with a personal account (Builder ID), you will be billed monthly. The AWS account that is linked to your Builder ID gets the bill.

The very first month you are subscribed, you are charged a prorated fee. For example, if you subscribe April 15th, you'll be charged half the subscription fee. After that, you'll be charged the full amount.

If you unsubscribe, billing stops at the end of the billing cycle. For more information, see [Unsubscribing from Amazon Q Developer Pro](q-admin-setup-unsubscribe.md).

## IAM Identity Center workforce users


If you're an administrator who has subscribed a set of IAM Identity Center workforce users to the Pro tier, you will be billed monthly for each user that you subscribe. For more information, see [Amazon Q Developer pricing](https://aws.amazon.com/q/developer/pricing).

If your business has [AWS Organizations](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html) set up, billing for Amazon Q Developer Pro usage is per AWS organization. The management account gets the bill. If the same user is subscribed to Amazon Q Developer in multiple accounts within the same organization, you will not be double-billed.

If you don't have AWS Organizations set up, the AWS account under which your users are subscribed gets the bill.

You can view your bill in the Billing and Cost Management console. The Amazon Q expenses are listed on the **Charges by service** tab, under **Q**. For more information about the Billing and Cost Management console, see [What is AWS Billing and Cost Management?](https://docs.aws.amazon.com/awsaccountbilling/latest/aboutv2/billing-what-is.html) in the *AWS Billing User Guide*.

You can identify the cost of Amazon Q subscriptions for specific users with resource IDs through AWS Billing and Cost Management. To do so, in the Billing and Cost Management console under [Data Exports](https://console.aws.amazon.com/costmanagement/home#/bcm-data-exports), create either a standard data export or a legacy CUR export with the **Include resource IDs** option selected. To learn more, refer to [Creating data exports](https://docs.aws.amazon.com/cur/latest/userguide/dataexports-create.html?icmpid=docs_costmanagement_hp-dataexports-export-type) in the *AWS Data Exports User Guide*.

If you unsubscribe users, billing stops at the end of the billing cycle. For more information, see [Unsubscribing from Amazon Q Developer Pro](q-admin-setup-unsubscribe.md).

# Amazon Q Developer subscription statuses
Subscription statuses

Subscription status information varies depending on whether you're an end-user with a personal account (Builder ID), or you're an administrator of IAM Identity Center workforce users.

## Personal account (Builder ID) users


If you are a user with a personal account (Builder ID), you can view the status of your Amazon Q Developer Pro subscription on the **Subscriptions** page of the Amazon Q Developer console.

The possible statuses of your subscription are:
+ **Active** – You have activated your subscription by using Amazon Q Developer features. You are being charged for your subscription.
+ **Canceled** – You canceled your subscription by unsubscribing from the Pro tier. You can no longer access Amazon Q Developer features and limits. For more information, see [Unsubscribing from Amazon Q Developer Pro](q-admin-setup-unsubscribe.md).

## IAM Identity Center workforce users


If you're an administrator who has subscribed a set of IAM Identity Center workforce users to the Pro tier, you can view the status of your users' subscriptions on the **Subscriptions** page of the Amazon Q Developer console.

The statuses will be slightly different depending on whether you’re looking at the **Groups** tab or the **Users** tab.

The statuses on the **Groups** tab are:
+ **Subscribed** – The group is subscribed to Amazon Q Developer Pro. You will be charged for active user subscriptions in the group.
+ **Canceled** – The group was canceled (unsubscribed) by an administrator. Users in the group can no longer access Amazon Q Developer Pro features. For more information, see [Unsubscribing from Amazon Q Developer Pro](q-admin-setup-unsubscribe.md).

The statuses on the **Users** tab are:
+ **Active** – The user has activated their subscription by using Amazon Q Developer features. You are being charged for this subscription.
+ **Pending** – The user is subscribed but has not activated their subscription. You are not being charged for this subscription.
+ **Canceled** – The user's subscription was canceled (unsubscribed) by an administrator, and the user can no longer access Amazon Q Developer features. For more information, see [Unsubscribing from Amazon Q Developer Pro](q-admin-setup-unsubscribe.md).
**Note**  
The **Users** tab of the Amazon Q Developer console does *not* show users who are subscribed as part of a group. To see these users, navigate to the Amazon Q console's (*not* the Amazon Q Developer console's) **Subscriptions** page. On this page, group-subscribed users will appear with a status of **Unavailable**. To see their actual status, choose a user from the table, and look for their status under **User associations**.

# Finding the Start URL for use with Amazon Q Developer
Finding the Start URL

**Note**  
This section does not apply to personal accounts (Builder IDs).

If you're an administrator who has subscribed a set of IAM Identity Center workforce users to the Pro tier, those users will need to sign in to Amazon Q in their IDE or at the command line using your IAM Identity Center's Start URL and Region. If you need to provide this URL to your users, you can find it in the Amazon Q Developer console, on the **Settings** page. The start URL is specific to your organization.

**To find the Start URL**

1. Sign in to the AWS Management Console.

1. Switch to the Amazon Q Developer console.

   To use the Amazon Q Developer console, you must have the permissions defined in [Allow administrators to use the Amazon Q Developer console](id-based-policy-examples-admins.md#q-admin-setup-admin-users) .

1. Choose **Settings**.

   The start URL is shown in **Start URL** near the top of the page. The start URL is specific to your organization.

# Managing the encryption method in Amazon Q Developer
Managing the encryption method

**Note**  
This section does not apply to personal accounts (Builder IDs).

By default, Amazon Q Developer uses an AWS managed key for encryption. For some features, you can set up a customer managed key to encrypt data. For a list of features that support encryption with customer managed keys, see [Data encryption](data-encryption.md#encryption-rest). 

To set the key used for encryption, complete the following procedure.

1. Sign in to the AWS Management Console.

1. Switch to the Amazon Q Developer console.

   To use the Amazon Q Developer console, you must have the permissions defined in [Allow administrators to use the Amazon Q Developer console](id-based-policy-examples-admins.md#q-admin-setup-admin-users) .

1. Choose **Settings**. 

1. Choose **Edit** in the Amazon Q Developer account details panel.  
![\[The Amazon Q Developer console settings page\]](http://docs.aws.amazon.com/amazonq/latest/qdeveloper-ug/images/q-dev-console-settings-3.png)

1. On the **Edit details** page, expand the **Encryption key - optional** section.

1. To use a customer managed key for encryption, select **Customize encryption settings (advanced)**. 

1. In the search bar that appears, search for the name of the key you want to use for encryption or enter the key ARN.

   If you haven't created a key yet, choose **Create an AWS KMS key**, and then return to this page to add your key.

1. To disable encryption with your customer managed key and revert to an AWS managed key for encryption, deselect **Customize encryption settings (advanced)**. 

# What is the Amazon Q Developer profile?
Q Developer profile

**Note**  
This section does not apply to personal accounts (Builder IDs).

An *Amazon Q Developer profile*, also known as a *settings profile*, a collection of Amazon Q Developer settings associated with a set of IAM Identity Center workforce user Pro tier subscriptions. The profile is also associated with an Amazon Q Developer managed application which ties the user's identity in IAM Identity Center to their subscription in Amazon Q Developer.

The very first time you subscribe users, you will be prompted to create this profile. Creating the profile causes several pages to appear in the side navigation of the Amazon Q Developer console where you can configure Amazon Q Developer Pro features. All subscriptions that you add to your account (during the initial subscription process, and later) will be associated with this profile.

Other characteristics of the Amazon Q Developer profile are:
+ The profile is mandatory for use with IAM Identity Center workforce users. You cannot subscribe workforce users without it. It must be created in the AWS account where you want to subscribe users to Amazon Q Developer Pro.
+ The profile can be created once per supported AWS Region, per AWS account. For a list of AWS Regions supported by the Amazon Q Developer profile, see [Supported Regions for the Q Developer console and Q Developer profile](q-admin-setup-subscribe-regions.md#qdev-console-and-profile-regions).

# Creating the Amazon Q Developer profile
Creating the profile

**Note**  
This section does not apply to personal accounts (Builder IDs).

Creating the Amazon Q Developer profile unlocks settings in the Amazon Q Developer console and is a prerequisite for subscribing users to Amazon Q Developer Pro. For more information about the profile, see [What is the Amazon Q Developer profile?](subscribe-understanding-profile.md).

**To create the Amazon Q Developer profile**
+ Subscribe users according to the instructions in [Getting started with IAM Identity Center](getting-started-idc.md). During the subscription process, you will be asked to create the profile.

# Deleting the Amazon Q Developer profile
Deleting the profile

**Note**  
This section does not apply to personal accounts (Builder IDs).

You might want to delete the Amazon Q Developer profile to quickly cancel all subscriptions and remove all Q Developer configurations from your AWS account. When you delete the Amazon Q Developer profile, the following occurs:
+ All subscriptions associated with the profile marked as **Canceled**, and users will no longer be able to access Amazon Q Developer features. The final monthly subscription fee is charged at the end of the current billing cycle for all users who had active subscriptions. You'll be charged for the full month; the fee won't be prorated. Subscriptions will continue to be visible in the Amazon Q Developer console until the end of the month, at which time they will be removed from view.
+ All settings and options in the Amazon Q Developer console that became available as a result of creating the profile will no longer be visible or take effect. For example, the Q Developer dashboard will no longer be visible, customizations will no longer be configurable or applied, and user activity reports will no longer be configurable or generated.
+ The managed application (called **QDevProfile-*region***) will be removed from the IAM Identity Center instance that is connected to Amazon Q Developer. (This IAM Identity Center instance might be a different account from the one where the profile is being deleted, depending on your [deployment option](deployment-options.md).)

**Note**  
If you accidentally delete the profile:  
You'll have to recreate it and then resubscribe users. You'll also have to reset any settings you configured previously through the Amazon Q Developer console. Your IAM Identity Center instance will remain, so there is no need to recreate user identities.
You won't be able to see historical data in the Amazon Q Developer dashboard after recreating the profile; you can only see data starting from the date of the new profile creation onward.

Use the following instructions to delete the Amazon Q Developer profile.

**Before you begin**
+ Remove any customizations you might have created to allow for the successful deletion of the profile.

**To delete the Amazon Q Developer profile**

1. Sign in to the AWS Management Console.

1. Switch to the Amazon Q Developer console.

   To use the Amazon Q Developer console, you must have the permissions defined in [Allow administrators to use the Amazon Q Developer console](id-based-policy-examples-admins.md#q-admin-setup-admin-users).

1. Choose **Settings**.

1. Near the top of the page, choose **Delete profile**.

# Enabling profile sharing in Amazon Q Developer
Enabling profile sharing

**Note**  
This section does not apply to personal accounts (Builder IDs).

If you are a management account administrator within an organization managed by [AWS Organizations](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html), you can enable the *profile sharing* feature. When profile sharing is enabled, the [Amazon Q Developer profile](subscribe-understanding-profile.md) that has been created in a management account will be shared with member accounts. Sharing the profile has one benefit: it allows IAM Identity Center workforce users who are subscribed to Amazon Q Developer Pro in a *management* account to use their Amazon Q Developer Pro subscription [in the AWS Management Console, and on AWS apps and websites](q-on-aws.md) while signed in to a *member* account. When profile sharing is disabled, these users can still use Amazon Q in the AWS Management Console, and on AWS apps and websites, while signed in to a member account, but they'll be subject to Free tier limits and features.

Enabling profile sharing has no effect on users' ability to use [Amazon Q in the integrated development environment (IDE)](q-in-IDE.md) or [on the command line](command-line.md).

Use the following instructions to enable profile sharing.

 **Prerequisites** 

Before you begin, make sure that:
+ You are an administrator of an AWS *management* account.
+ You have an IAM Identity Center instance set up in your management account and connected to Amazon Q. To check, sign in to your management account, go to the Amazon Q Developer console, choose **Settings**, and make sure that a **Start URL** appears. 
+ You have subscribed users to Amazon Q Developer Pro in your management account.
+ You have the minimum permissions required to access the Amazon Q Developer console. For more information, see [Allow administrators to use the Amazon Q Developer console](id-based-policy-examples-admins.md#q-admin-setup-admin-users).

**To enable profile sharing**

1. Sign in to the AWS Management Console using your AWS management account.

1. Switch to the Amazon Q Developer console.

1. Choose **Settings**. 

1. Scroll to the **Member account settings** section and choose **Edit**. 

1. Enable **Q Developer managed application and settings profile**. 

1. Choose **Save**. 

   Users who are subscribed to Amazon Q Developer Pro in your management account will now be able to use their Amazon Q Developer Pro subscription in the AWS Management Console, and on AWS apps and websites while signed in to a member account.

# Troubleshooting Amazon Q Developer Pro subscriptions
Troubleshooting subscriptions

If you are having trouble with Amazon Q Developer Pro subscriptions, review the following issues to understand how to resolve them.

**Topics**
+ [

# Unable to subscribe users
](unable-to-subscribe-standalone.md)
+ [

# Users not receiving activation emails
](users-not-receiving-emails.md)
+ [

# Users unable to use their subscription on AWS websites
](unable-to-use-pro-on-websites.md)
+ [

# Users unable to use their subscription in the IDE
](unable-to-use-pro-in-ide.md)
+ [

# Can't see subscribed users
](users-not-appearing.md)

# Unable to subscribe users


**Problem: Unable to subscribe users to Amazon Q Developer Pro**

**Solutions:**
+ Verify that you have the minimum permissions required to subscribe users. For more information, see [Allow administrators to use the Amazon Q Developer console](id-based-policy-examples-admins.md#q-admin-setup-admin-users). After you obtain the necessary permissions, reload the console page to access Amazon Q. 
+ Check that you're in the Amazon Q Developer console (not the Amazon Q console).
+ Check that you're in a supported AWS Region for Amazon Q Developer. For more information, see [Supported Regions for the Q Developer console and Q Developer profile](q-admin-setup-subscribe-regions.md#qdev-console-and-profile-regions). 
+ Ensure you're following the correct workflow for the type of account you have. For more information, see [Getting started with a personal account (Builder ID)](getting-started-builderid.md), [Subscribe users to Amazon Q Developer Pro in a standalone account](subscribe-standalone.md), [Subscribe users to Amazon Q Developer Pro in a management account](subscribe-management.md), or [Subscribe users to Amazon Q Developer Pro in a member account](subscribe-member.md).

# Users not receiving activation emails


**Problem: Users are not receiving activation emails**

**Solutions:**
+ Verify the email address is correct in AWS IAM Identity Center.
+ Have users check their spam or junk folders for emails titled **Activate Your Amazon Q Developer Pro Subscription**. 
+ Allow up to 24 hours for activation emails to be delivered.
+ Verify the user was properly added to IAM Identity Center. For more information, see [Add users to your IAM Identity Center directory](https://docs.aws.amazon.com/singlesignon/latest/userguide/addusers.html) in the *AWS IAM Identity Center User Guide*.

# Users unable to use their subscription on AWS websites


**Problem: Users are unable to use their subscriptions on AWS websites**

When attempting to use Amazon Q [in the AWS Management Console, and on AWS apps and websites](q-on-aws.md), users see the following message in their browser:

`Your account has not been configured to use an Amazon Q subscription. You currently have access to the Free tier of Amazon Q. Contact your AWS administrator to configure your subscription.`

**Solutions:**
+ Verify that identity-enhanced console sessions are enabled (only available with organization instances of IAM Identity Center). For information about how to enable identity-enhanced console sessions, see [Enabling identity-enhanced console sessions](https://docs.aws.amazon.com/singlesignon/latest/userguide/identity-aware-sessions.html).
+ Check that the user has an active Amazon Q Developer Pro subscription. For more information, see [Amazon Q Developer subscription statuses](q-admin-setup-subscribe-status.md). 
+ Verify that you're not using an account instance of IAM Identity Center. Account instances don't support console access. For more information, see [Account instance considerations](https://docs.aws.amazon.com/singlesignon/latest/userguide/account-instances-identity-center.html#about-account-instance) in the *AWS IAM Identity Center User Guide*.

  Users with identities in an account instance of IAM Identity Center can still use Amazon Q in the console but will be limited to Free tier.
+ If the user recently switched from the Free tier to the Pro tier, have them sign out of the AWS Management Console or another AWS website and sign back in again.
+ If you subscribed the user as part of a group, allow up to 24 hours for their subscription to be activated. There might be a delay between the time the user is added to the group and the time their subscription becomes active.
+ Verify that the user's access to the Amazon Q Developer Pro managed application was not revoked or that the managed application was not deleted. Restore access to the managed application if needed.
+ If users don't have an active subscription, try getting them to refresh their page so that they can use the Free tier.

# Users unable to use their subscription in the IDE


**Problem: IAM Identity Center workforce users are unable to use their Pro subscriptions in the IDE**

**Solutions:**
+ Check that the user has an active Amazon Q Developer Pro subscription. For more information, see [Amazon Q Developer subscription statuses](q-admin-setup-subscribe-status.md).
+ If the user recently switched from the Free tier to the Pro tier, have them sign out of Amazon Q in the IDE and sign back in again.
+ If you subscribed the user as part of a group, allow up to 24 hours for their subscription to be activated. There might be a delay between the time the user is added to the group and the time their subscription becomes active.
+ Verify that the user's access to the Amazon Q Developer Pro managed application was not revoked or that the managed application was not deleted. Restore access to the managed application if needed.
+ Have users sign in with a Builder ID to use the Free tier while they wait for their subscription to become active. For more information, see [Installing the Amazon Q Developer extension or plugin in your IDE](q-in-IDE-setup.md).

# Can't see subscribed users


**Problem: Subscribed users are not appearing in the Amazon Q Developer console.**

You have subscribed one or more users to the Pro tier, but when you navigate to the Amazon Q Developer console's **Subscriptions** page, you can't see them.

**Solutions:**
+ Make sure you're signed in to the correct AWS account and AWS Region.
+ Try switching to the **Amazon Q** console. The Amazon Q console is able to display users who were subscribed as part of a group, and is also able to display subscriptions across multiple accounts in an organization managed by AWS Organizations.
+ If you switched to the **Amazon Q** console, and still can't see users, do the following:
  + Make sure you're in the correct AWS Region. You will need to be in the Region where your IAM Identity Center instance is deployed. This might be a different Region from your Amazon Q Developer console and profile.
  + If you're using AWS Organizations, try enabling trusted access so that you can see subscriptions in both management and member accounts. For more information, see [Viewing an aggregated list of Amazon Q Developer subscriptions](subscribe-visibility.md).

# Viewing an aggregated list of Amazon Q Developer subscriptions
Viewing an aggregate list of subscriptions

**Note**  
This section does not apply to personal accounts (Builder IDs).

If you are a management account administrator within an organization managed by [AWS Organizations](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html), you can configure Amazon Q to display Amazon Q Developer Pro subscriptions from both *management* and *member* accounts in a single, unified list on the **Subscriptions** page of the Amazon Q console (*not* the Amazon Q Developer console) while signed in to your management account. This organization-wide visibility eliminates the need to sign in to multiple accounts to track your subscriptions.

**Note**  
Unified subscription information also appears on the **Dashboard** page of the Amazon Q Developer console when you enable organization-wide visibility.

If you are a member account administrator, you will only ever be able to view the subscriptions within the member accounts that you administer. This is true regardless of whether organization-wide visibility was enabled in the management account.

To enable organization-wide visibility of Amazon Q Developer subscriptions, you must enable trusted access to Amazon Q in your organization. *Trusted access* is an AWS Organizations feature that lets you designate Amazon Q as a *trusted service* that is allowed to query your organization's structure. This querying is required in order to show the status of subscriptions.

To learn more about trusted access, see [Enabling trusted access for AWS Account Management](https://docs.aws.amazon.com/accounts/latest/reference/using-orgs-trusted-access.html) in the *AWS Organizations User Guide*. 

To learn more about member and management accounts, see [Terminology and concepts for AWS Organizations](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html) in the *AWS Organizations User Guide* for explanations.

Use the following instructions to enable trusted access to Amazon Q in your organization.

 **Prerequisites** 

Before you begin, make sure that:
+ You are an administrator of an AWS *management* account.
+ You have an *organization instance* of IAM Identity Center set up in your management account and connected to Amazon Q Developer.
+ Your organization instance of IAM Identity Center contains users who are subscribed to Amazon Q Developer Pro in member accounts.
+ You have the minimum permissions required to perform actions in the Amazon Q or Amazon Q Developer console (you can use either console to enable trusted access). For more information, see [Allow administrators to use the Amazon Q console](id-based-policy-examples-admins.md#q-admin-setup-admin-users-sub) and [Allow administrators to use the Amazon Q Developer console](id-based-policy-examples-admins.md#q-admin-setup-admin-users).

**To enable trusted access (enable organization-wide visibility of subscriptions)**

1. Sign in to the AWS Management Console using your AWS management account.

1. Do one of the following depending on the console you want to use:
   + Switch to the Amazon Q console. 

     Choose **Subscriptions**. 

     At the bottom of the page, in the **Subscription view settings** section, choose **Edit**.

     Choose **On**.
   + Switch to the Amazon Q Developer console.

     Choose **Settings**.

     In the **Subscription view settings** section, choose **Edit**. 

     Enable the toggle.

1. Choose **Save**. 

   Trusted access to Amazon Q is now enabled. Users and groups who are subscribed in member accounts now appear in the Amazon Q console (not the Amazon Q Developer console) when you're signed in as a management account administrator.

# Unsubscribing from Amazon Q Developer Pro
Unsubscribing

How you unsubscribe from the Pro tier depends on whether you're an end-user with a personal account (Builder ID) or an administrator of IAM Identity Center workforce users.

## Unsubscribing a personal account (Builder ID)


Read this section if you want to unsubscribe your personal account (Builder ID) from the Pro tier.

When you unsubscribe your Builder ID, your subscription is marked as **Canceled**, and you can no longer access Amazon Q Developer features. (You can still use the [Free tier](q-tiers.md) though, provided you have not exceeded your Free tier limits.) The final monthly subscription fee is charged at the end of the current billing cycle. You'll be charged for the full month; the fee won't be prorated.

**Warning**  
Deleting your Builder ID does not unsubscribe you. To stop being billed, you must actively unsubscribe yourself using the instructions in this section. Similarly, deleting your Amazon Q Developer Profile or Kiro Profile does not cancel your Builder ID subscription.

You can unsubscribe starting from one of the following interfaces:
+ IDE
+ command line
+ AWS Management Console

------
#### [ IDE ]

**To unsubscribe your Builder ID starting from your IDE**

1. Authenticate to Amazon Q in your IDE using your personal account (Builder ID). For more information, see [Installing the Amazon Q Developer extension or plugin in your IDE](q-in-IDE-setup.md).

1. From the Amazon Q menu, choose **Manage Q Developer Pro Subscription**.

   A browser window opens.

1. If prompted, sign in to the AWS Management Console using the AWS account that's linked to your personal account (Builder ID). You specified this AWS account when you upgraded your Builder ID to the Pro tier. For more information, see [Upgrading a personal account (Builder ID)](upgrade-to-pro.md#upgrade-builder-id).

   The **Subscriptions** page in the Amazon Q Developer console appears.

1. In the **Builder ID users** section, choose **Unsubscribe**.

------
#### [ Command line ]

**To unsubscribe your Builder ID starting from the command line**

1. On a computer where Amazon Q for the command line is installed, open a terminal.

1. Make sure you're signed in with your personal account (Builder ID) by typing `q whoami` at the command line.

   You should see a `Logged in with Builder ID` message.

1. Start a chat session by typing `q chat` at your terminal's prompt.

   An interactive chat sessions opens.

1. Type **/subscribe --manage**.

   The AWS Management Console launches in a browser window.
**Note**  
If the AWS Management Console doesn't automatically launch, copy and paste the URL from the terminal into a browser window.

1. If prompted, sign in to the AWS Management Console using the AWS account that's linked to your personal account (Builder ID). You specified this AWS account when you upgraded your Builder ID to the Pro tier. For more information, see [Upgrading a personal account (Builder ID)](upgrade-to-pro.md#upgrade-builder-id).

   The **Subscriptions** page in the Amazon Q Developer console appears.

1. In the **Builder ID users** section, choose **Unsubscribe**.

------
#### [ AWS Management Console ]

**To unsubscribe your Builder ID starting from the AWS Management Console**

1. Sign in to the AWS Management Console using the AWS account that's linked to your personal account (Builder ID). You specified this AWS account when you upgraded your Builder ID to the Pro tier. For more information, see [Upgrading a personal account (Builder ID)](upgrade-to-pro.md#upgrade-builder-id).

1. If you don't have a Kiro Profile, create one in the US East (N. Virginia) Region (IAD) by following the [Kiro onboarding quickstart](https://kiro.dev/docs/enterprise/getting-started/). If you have a Kiro Profile but not a Amazon Q Developer Profile, choose **Settings**, then under **Other applications**, choose **Enable**.

1. Switch to the Amazon Q Developer console in the US East (N. Virginia) Region (IAD).

1. Choose **Subscriptions**.

1. In the **Builder ID users** section, select the subscription and choose **Unsubscribe**.

------

## Unsubscribing IAM Identity Center workforce users


If you are the administrator of an AWS standalone account, an AWS management account, or an AWS member account, use the following procedure to unsubscribe IAM Identity Center workforce users from your account.

For more information about AWS management and member accounts, see [Managing AWS accounts in an organization with AWS Organizations](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts.html).

Notes about unsubscribing users:
+ If you are an administrator of either a management or member account within an organization managed by [AWS Organizations](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html), you can only unsubscribe users if your created their subscriptions.
+ If a user has been subscribed in both member and management accounts, both account administrators must unsubscribe the user from their respective accounts for the user to be fully unsubscribed.
+ If you are a management account administrator, you can view other accounts the user is subscribed in by choosing **View subscriptions from member accounts** on the **Settings** page of the Amazon Q Developer console. This allows you to coordinate with member account administrators for unsubscription. Alternatively, if you have the appropriate permissions, you can sign in as a member account administrator and unsubscribe the user directly. For more information about viewing member account subscriptions as a management account administrator, see [Viewing an aggregated list of Amazon Q Developer subscriptions](subscribe-visibility.md). 
+ After unsubscribing users or groups, their subscriptions are marked as **Canceled**, and they can no longer access Amazon Q Developer features. (They can still use the [Free tier](q-tiers.md) though, provided they have not exceeded their Free tier limits.) The final monthly subscription fee is charged at the end of the current billing cycle for all users who had active subscriptions. You'll be charged for the full month; the fee won't be prorated.

**To unsubscribe a user or group you manage**

1. Sign in to the AWS Management Console using your AWS standalone, management, or member account.

1. Switch to the Amazon Q Developer console.

1. In the **Identity provider users and groups** section, choose the **Users** or **Groups** tab.

1. Choose the user or group you want to unsubscribe.

1. Choose **More actions**.

1. Choose **Unsubscribe**.

# Upgrading to Amazon Q Developer Pro
Upgrading to the Pro tier

How you upgrade to the Pro tier from the Free tier depends on whether you're an end-user with a personal account (Builder ID) or whether you're an administrator of IAM Identity Center workforce users.

## Upgrading a personal account (Builder ID)


Read this section if you want to upgrade your personal account (Builder ID) from the Free tier to a Pro tier monthly subscription. For reasons why you might consider upgrading, see [Tiers of service](q-tiers.md), and [Limitations of Builder IDs](getting-started-builderid.md#builder-id-limitations).

You can upgrade starting from one of the following interfaces:
+ IDE
+ command line

**Before you begin**
+ Create an AWS account if you don't have one yet. This account will be linked to your Builder ID, and will be charged the monthly subscription fee. For more information about creating an account, see [Create an AWS account](https://docs.aws.amazon.com/accounts/latest/reference/manage-acct-creating.html) in the *AWS Account Management Reference Guide*.
**Note**  
You cannot link multiple Builder IDs to a single AWS account. If you have multiple Builder IDs that you want to upgrade, create separate AWS accounts for each. 

------
#### [ IDE ]

**To upgrade starting from the IDE**

1. Authenticate to Amazon Q in your IDE using your personal account (Builder ID). For more information, see [Installing the Amazon Q Developer extension or plugin in your IDE](q-in-IDE-setup.md).

1. In your IDE, do one of the following:
   + If you see a `Monthly request limit reached` message in the Amazon Q chat window, choose **Subscribe to Q Developer Pro**.

     Or
   + From the Amazon Q menu, choose **Subscribe to Q Developer Pro**.

     A browser window opens.

1. If prompted, sign in using your AWS account. You should have created this account previously, as described in **Before you begin**.

   A **Review upgrade details for Q Developer Pro** page appears. The page shows your Builder ID, AWS account number, and subscription fee, among other information. For more information about the subscription fee, see [Subscription billing](tracking-across-org-cost-usage.md). The **Activation token** field shows a one-time token that links your AWS account with your Builder ID. This token is never used again.

1. Choose **Confirm upgrade**.

   The **Subscriptions** page of the Amazon Q Developer console appears with an **Upgrade to Q Developer Pro successful** message at the top. You should see your user name listed in the **Builder ID users** section.

   Your personal account (Builder ID) is now subscribed to the Pro tier.

1. (Optional) Return to the Amazon Q chat window in your IDE.

   You should see a **Successfully subscribed to Amazon Q Developer Pro** message.

------
#### [ Command line ]

**To upgrade starting from the command line**

1. On a computer where Amazon Q for the command line is installed, open a terminal.

1. Make sure you're signed in with your personal account (Builder ID) by typing `q whoami` at the command line.

   You should see a `Logged in with Builder ID` message.

1. Start a chat session by typing `q chat` at your terminal's prompt.

   An interactive chat sessions opens.

1. Type **/subscribe**.

   The AWS Management Console launches in a browser window.
**Note**  
If the AWS Management Console doesn't automatically launch, copy and paste the URL from the terminal into a browser window.

1. If prompted, sign in using your AWS account. You should have created this account previously, as described in **Before you begin**.

   A **Review upgrade details for Q Developer Pro** page appears. The page shows your Builder ID, AWS account number, and subscription fee, among other information. For more information about the subscription fee, see [Subscription billing](tracking-across-org-cost-usage.md). The **Activation token** field shows a one-time token that links your AWS account with your Builder ID. This token is never used again.

1. Choose **Confirm upgrade**.

   The **Subscriptions** page of the Amazon Q Developer console appears with a **Upgrade to Q Developer Pro successful** message at the top. You should see your user name listed in the **Builder ID users** section.

   Your personal account (Builder ID) is now subscribed to the Pro tier.

1. (Optional) Verify that you're subscribed by typing **/subscribe** at the Q CLI prompt. Amazon Q should indicate that you're already subscribed.

------

## Upgrading IAM Identity Center workforce users to the Pro tier
Upgrading IAM Identity Center workforce users

If you are the administrator of IAM Identity Center workforce users, you can upgrade these users to the Pro tier following the instructions in [Getting started with IAM Identity Center](getting-started-idc.md).