

Amazon CodeCatalyst will no longer be open to new customers starting on November 7, 2025. If you would like to use the service, please sign up prior to November 7, 2025. For more information, see [Migrating from Amazon CodeCatalyst](https://docs.aws.amazon.com/codecatalyst/latest/userguide/migration.html).

# Administering Identity Center applications
<a name="managing-federation-application"></a>

An *Identity Center application* is an association between your CodeCatalyst space and IAM Identity Center. The Identity Center application allows users from your company directory to sign in to CodeCatalyst, so your application name will represent your company and will be visible for selection as an option where users from a workforce directory will access CodeCatalyst. As part of creating a space that supports identity federation, you will choose or create the Identity Center application that will be associated with your space. You can associate multiple spaces with a single Identity Center application. When setting up the Identity Center application for CodeCatalyst, note that the application name must be unique across CodeCatalyst and your IAM Identity Center instances. This uniqueness requirement helps prevent confusion and ensures proper identification of different applications. This unique name is primarily for administrative purposes within IAM Identity Center and doesn't affect the functionality of CodeCatalyst.

**Note**  
The name for your Identity Center application must be globally unique. In addition, since the name will be viewable for signing in and on certain pages in CodeCatalyst, choose a name that will suitably relate to your company for users signing in.

You can manage this application and its association with your space in the Amazon CodeCatalyst page in the AWS Management Console. For information about creating your application, see [Creating a space for identity federation](setting-up-federation-space-create.md).

**Important**  
Dev Environments aren't available for users in spaces where Active Directory is used as the identity provider. When planning a space where the identity provider will be Active Directory, note that users will not be able to use Dev Environments. For more information, see [I can't create a Dev Environment when I'm signed in to CodeCatalyst using a single sign-on account](https://docs.aws.amazon.com/codecatalyst/latest/userguide/devenvironments-troubleshooting.html#troubleshoot-create-dev-env-idprovider).  



| Topic | Description | 
| --- | --- | 
|  [Viewing Identity Center application details](managing-federation-application-view.md)  |  This topic describes how to view the space name, display name, and application name of your Identity Center application. You can also view the users to whom you have assigned the **Space administrator** role, and view the SSO groups that you have added to your space.  | 
|  [Editing Identity Center application details](managing-federation-application-edit.md)  |  This topic describes how to edit the SSO groups assigned to your space, how to assign additional administrators to your space, and how to make updates to your connected groups.  | 
|  [Associating a space to your Identity Center application](managing-federation-application-associate.md)  |  This topic describes how to connect a CodeCatalyst space to an Identity Center application.  | 
|  [Disassociating an Identity Center application from a space](managing-federation-application-disassociate.md)  |  This topic describes how to disconnect a CodeCatalyst space from an Identity Center application. You can reconnect the application later, or associate it with another space.  | 

# Viewing Identity Center application details
<a name="managing-federation-application-view"></a>

You can view the details for the space associated with your Identity Center application.

**Note**  
Users or groups that are added to IAM Identity Center assignments usually appear in CodeCatalyst within two hours. Depending on the amount of data being synchronized, this process might take longer. 

**To view space and Identity Center application details**

1. Open the Amazon CodeCatalyst page in the AWS Management Console at [https://us-west-2.console.aws.amazon.com/codecatalyst/home?region=us-west-2\$1/](https://us-west-2.console.aws.amazon.com/codecatalyst/home?region=us-west-2#/).

1. Choose **IAM Identity Center**. On the **IAM Identity Center** page, under **Application Enabled Spaces**, view the spaces enabled for SSO and associated with your application.
**Tip**  
Make sure you are signed in to the AWS Management Console with the AWS account that will be the specified billing account for your space. 

1. In **Space name**, view the name for your space.

1. In **Display name**, view the name that displays on the sign-in page for your space.

1. In **Application name**, view the name of your Identity Center application.

1. In **Space administrators**, view the users that you have assigned the **Space administrator** role for your space. These are members of the SSO group who have individual permissions in CodeCatalyst.

1. In **Connected groups**, view the SSO groups that you have added to your space. The users in these groups can be viewed in the member lists in your CodeCatalyst space, projects, and teams.

1. To make updates to your connected groups, choose **Edit Identity Center application**. You will be taken to IAM Identity Center where you can work with your Identity federation administrator to configure SSO users and groups for your instance in IAM Identity Center.

# Editing Identity Center application details
<a name="managing-federation-application-edit"></a>

You can edit the details for your Identity Center application, such as choosing SSO users and groups that are available in IAM Identity Center.

**Note**  
Users or groups that are added to IAM Identity Center assignments usually appear in CodeCatalyst within two hours. Depending on the amount of data being synchronized, this process might take longer. 

**To edit space and Identity Center application details**

1. Open the Amazon CodeCatalyst page in the AWS Management Console at [https://us-west-2.console.aws.amazon.com/codecatalyst/home?region=us-west-2\$1/](https://us-west-2.console.aws.amazon.com/codecatalyst/home?region=us-west-2#/).

1. Choose **IAM Identity Center**. On the **IAM Identity Center** page, under **Application Enabled Spaces**, view the spaces enabled for SSO and associated with your application.
**Tip**  
Make sure you are signed in to the AWS Management Console with the AWS account that will be the specified billing account for your space. 

1. Choose your space from the list, and then choose **Edit space**,

1. On the **Edit assigned users and groups** page, view your application details.

1. In **Groups connected to this space**, choose the SSO groups that you want to add to your space. The users in these groups can be viewed in the member lists in your CodeCatalyst space, projects, and teams.

1. Under **Space administrators**, in **Assign additional administrators**, choose the users to which you want to assign the **Space administrator** role for your space. These are members of the SSO group who have individual permissions in CodeCatalyst.

1. To make updates to your connected groups, choose **Manage in IAM Identity Center**. You will be taken to IAM Identity Center where you can work with your Identity federation administrator to configure SSO users and groups for your instance in IAM Identity Center.

# Associating a space to your Identity Center application
<a name="managing-federation-application-associate"></a>

You can associate a space with your CodeCatalyst Identity Center application. You must have already competed the prerequisites for setting up identity federation in AWS Organizations and IAM Identity Center.

**To associate a space to an Identity Center application**

1. Open the Amazon CodeCatalyst page in the AWS Management Console at [https://us-west-2.console.aws.amazon.com/codecatalyst/home?region=us-west-2\$1/](https://us-west-2.console.aws.amazon.com/codecatalyst/home?region=us-west-2#/).

1. Choose **IAM Identity Center**. On the **IAM Identity Center** page, under **Application Enabled Spaces**, view the spaces enabled for SSO and associated with your application.
**Tip**  
Make sure you are signed in to the AWS Management Console with the AWS account that will be the specified billing account for your space. 

1. Under **Application Enabled Spaces**, choose **Connect space**. On the **Choose or create a CodeCatalyst space** page, choose the space that you want to associate with your application, or you can choose to create a new space.

# Disassociating an Identity Center application from a space
<a name="managing-federation-application-disassociate"></a>

You can disassociate the Identity Center application that is associated with your CodeCatalyst space. You can reassociate the Identity Center application later, or you can associate the Identity Center application to another space.

**Note**  
If you delete the identity store in IAM Identity Center, then the Identity Center application is automatically disassociated from the CodeCatalyst space.

1. Open the CodeCatalyst console at [https://codecatalyst.aws/](https://codecatalyst.aws/).

1. Choose **IAM Identity Center**. On the **IAM Identity Center** page, under **Application Enabled Spaces**, view the spaces enabled for SSO and associated with your application.
**Tip**  
Make sure you are signed in to the AWS Management Console with the AWS account that will be the specified billing account for your space. 

1. Under **Application Enabled Spaces**, choose the space that you want to disassociate from your application. Choose **Disassociate space from application**.

1. Enter the confirmation for disassociating the application, and then choose **Disassociate**.
**Important**  
This action will remove all SSO users as members in the CodeCatalyst space.

   The Identity Center application will be available to be reassociated with this space or another space when needed.