Amazon Web Services Identity Router Deployment Requirements
Before you deploy the identity router in your Amazon Web Services (AWS) cloud-computing environment, you must configure the virtual environment to meet the following requirements. See your AWS documentation for instructions.
- The identity router Amazon Machine Image (AMI) must be shared with your Amazon account. For instructions, see Obtain the Identity Router Image.
- Your Amazon account must have access to deploy t2.large or better instance types.
- Your Amazon Virtual Private Cloud (VPC) must include public and private subnets based on your deployment needs. For example, you might deploy the identity router in a public subnet and host identity sources or Authentication Manager instances in a private subnet, or you might deploy identity routers in multiple subnets across availability zones for high availability. For more information, see Amazon Web Services Identity Router Deployment Models.
- The DHCP options set for your VPC must specify the DNS servers required for your deployment.
- You can assign static values for private IP addresses within your VPC, or permit Amazon to assign private IP addresses using DHCP.
- You can use default values dynamically assigned by Amazon for public IP addresses, but each time an instance in your environment is restarted, it may receive a different public address. If your organization manages its own DNS service, SecurID recommends allocating a persistent Elastic IP address through AWS, and assigning it to the identity router instance after you complete the instance launch process.
Note: Elastic Network Adapter (ENA) support is currently unavailable for IDR.
Amazon Virtual Server Instance Hardware Requirements
The virtual instance you configure when deploying the identity router AMI must meet the following requirements.
| Hardware Component | Minimum Requirement |
|---|---|
| Family | General purpose |
| Type | t2.large |
| vCPUs | 2 |
| Memory | 8 GB |
| Disk Space | 54 GB |
Port and Protocol Requirements
You must configure security groups, route tables, and network access control lists in your AWS environment to allow either public or private network access for each identity router service, depending on how your resources will connect to the identity router, and according to the requirements specified in Identity Router Network Interfaces and Default Ports.
Related Articles
AM 7.1- can the isMemberOf attribute in SunOne DS 6.X be used in an identity source mapping filter 4Number of Views View Messages in the Activity Monitor 27Number of Views Users show as disabled after enabling them from dashboard or by editing them in RSA Authentication Manager 8.x 261Number of Views Enabling debug output for SMTP output action 38Number of Views What are the services and processes running on the Enterprise Manager Enterprise Coordinator and Remote Site Coordinator … 42Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x