IAM authentication and authorization for Amazon MQ for RabbitMQ
Amazon MQ for RabbitMQ supports multiple authentication and authorization methods. For information about all supported methods, see Authentication and authorization for Amazon MQ for RabbitMQ brokers.
IAM authentication and authorization allows broker users to authenticate using AWS IAM credentials through IAM outbound federation
Important considerations
-
IAM authentication is supported on RabbitMQ versions 3.13, 4.2 and above. It isn't supported on Amazon MQ for ActiveMQ brokers.
-
IAM authentication requires IAM outbound federation to be configured and available in your AWS account.
-
This method builds on the existing OAuth 2.0 infrastructure in Amazon MQ for RabbitMQ, with AWS serving as the OAuth 2.0 identity provider.
-
Amazon MQ automatically creates a system user named
monitoring-AWS-OWNED-DO-NOT-DELETEwith monitoring-only permissions. This user uses RabbitMQ's internal authentication system even on IAM-enabled brokers and is restricted to loopback interface access only.
On this page
How IAM authentication works
IAM authentication for Amazon MQ for RabbitMQ uses IAM outbound federation
Limitations
IAM authentication for Amazon MQ for RabbitMQ has the following limitation:
-
Scope claim configuration – You cannot use a scope claim directly because the JWT token from STS is nested. The key is
sts.amazonaws.com, which requires using scope aliases in the RabbitMQ configuration to map IAM roles to RabbitMQ permissions. This limitation also prevents using IAM policies for authorization fully, requiring RabbitMQ configuration for authorization instead.
For information about how to configure IAM authentication and authorization for your Amazon MQ for RabbitMQ brokers, see Using IAM authentication and authorization.