Trusted identity propagation
Trusted identity propagation in IAM Identity Center enables administrators of AWS services to grant permissions based on user attributes, such as user ID or group associations. With trusted identity propagation, identity context is added to an IAM role to identify the user requesting access to AWS resources. This context is propagated to other AWS services.
Starting on 7/23/2025, Amazon SageMaker Unified Studio supports trusted identity propagation for SQL analytics that includes Amazon Athena and Amazon Redshift. To enable trusted identity propagation for SQL analytics that includes Amazon Athena and Amazon Redshift within your Amazon SageMaker unified domains, you can do either of the following:
-
Create a new Amazon SageMaker unified domain - from 7/23/2025 and beyond, all newly created Amazon SageMaker unified domains support trusted identity propagation with IdC for SQL analytics that includes Amazon Athena and Amazon Redshift. Other than creating a new domain, no further action is required from the administrator to configure Trusted Identity Propagation for SQL analytics tasks with Amazon Athena and Amazon Redshift for their new domain.
-
Update your existing Amazon SageMaker unified domain - if your domain was created prior to 7/23/2025, navitate to your domain's details page and locate the Amazon SageMaker Unitified Studio supports IAM Identity Center trusted identity propagation banner. To update your domain to support Trusted Identity Propagation in Amazon Athena and Amazon Redshift, choose the Update now button.
Once this update is complete, you must set the
enableTrustedIdentityPropagationPermissions
property in your project profile's
default Tooling blueprint To do this, complete the following procedure:
-
Navigate to the Amazon SageMaker management console at https://console.aws.amazon.com/datazone
and use the region selector in the top navigation bar to choose the appropriate AWS Region. -
Choose the domain that contains the project profile whose Tooling blueprint you want to update.
-
Choose the Project profiles tab and then choose the project profile that you want to update.
-
In the project profile details page, choose Edit.
-
On the project profile's edit page, in the Tooling blueprint parameters section, choose the enableTrustedIdentityPropagationPermissions parameter and then choose Edit.
-
On the Edit blueprint parameter page, set the enableTrustedIdentityPropagationPermissions parameter value to True.
-
Optional - to enforce authorization based on trusted identity propagation identity, you can make the enableTrustedIdentityPropagationPermissions parameter non-editable by unchecking the Editable checkbox under Editable value.
-
Choose Save in the Edit blueprint parameter page.
Important
In the current release, trusted identity propagation within Amazon SageMaker unified domains is only supported for SQL analytics tasks with Amazon Athena and Amazon Redshift. Therefore, even though you can set the "enableTrustedIdentityPropagationPermissions" parameter value to "True" in the Tooling blueprint of any of your project profiles, such as All capabilities, Generative AI application development, SQL analytics, or any custom project profile, trusted identity propagation and authorization based on Trusted Identity Propagation is only supported for the Amazon Athena and Amazon Redshift tools within the chosen project profile.
We recommend creating a dedicated project profile for trusted identity propagation supported tools and setting enableTrustedIdentityPropagationPermissions to True. This approach clearly establishes trusted identity propagation as the data authorization method for all projects using this profile.