Trusted identity propagation with Amazon Athena - AWS IAM Identity Center

Trusted identity propagation with Amazon Athena

The steps to enable trusted identity propagation depend on whether your users interact with AWS managed applications or customer managed applications. The following diagram shows a trusted identity propagation configuration for client-facing applications - either AWS managed or external to AWS - that uses Amazon Athena to query Amazon S3 data with access control provided by AWS Lake Formation and Amazon S3 Access Grants.

Note
  • Trusted identity propagation with Amazon Athena requires the use of Trino.

  • Apache Spark and SQL clients connected to Amazon Athena via ODBC and JDBC drivers are not supported.

Diagram of trusted identity propagation using Athena, Amazon EMR, Lake Formation, and IAM Identity Center

AWS managed applications

The following AWS managed client-facing application supports trusted identity propagation with Athena:

  • Amazon EMR Studio

To enable trusted identity propagation, follow these steps:
Note

Both Lake Formation and Amazon S3 Access Grants are required for access control to AWS Glue Data Catalog and for Athena query results in Amazon S3.

Customer managed applications

To enable trusted identity propagation for users of custom-developed applications, see to Access AWS services programmatically using trusted identity propagation in the AWS Security Blog.