Amazon Q Developer in chat applications organization policies - Amazon Q Developer in chat applications

AWS Chatbot is now Amazon Q Developer. Learn more

Amazon Q Developer in chat applications organization policies

Organization administrators can manage multiple Amazon Q Developer settings across all accounts within an organization using Amazon Q Developer chat applications policies (chat applications policies). Chat applications policies define where Amazon Q Developer can deliver notifications and if it can respond to Amazon Q Developer mention events. Using chat applications policies, administrators can:

  • Enforce which chat platforms can be used across your organization (Amazon Chime, Microsoft Teams, and Slack)

  • Restrict chat client access to specific workspaces and teams.

  • Restrict Slack channel visibility to either public or private channels.

  • Set and enforce specific role settings.

Chat applications policies restrict and take precedence over account level settings like role settings and Channel guardrail policies. Administrators can define rules in a policy and apply those rules to an entire organization or a group of accounts, referred to as OUs. For more information, see Managing organizational units in the AWS Organizations User Guide. You can access and modify these policies from the Amazon Q Developer console or the AWS Organizations console. For more information about organization policies, see Managing policies in AWS Organizations AWS Organizations User Guide.

If your users try to perform an action restricted by your chat applications policy, they are informed via error message that they are disallowed due to the policy and we recommend that they contact their organization administrator.

Note

Amazon Q Developer organization policies are validated at runtime, so existing resources are continuously checked for compliance. There is no overlap with existing IAM permissions as there aren’t currently any runtime-based IAM permissions for sending notifications or interacting with Amazon Q Developer.

Note

Chat application policies are limited to AWS account access to Amazon Q Developer in chat applications. These policies don't manage Amazon Q Business access from chat applications.

Example Amazon Q Developer in chat applications organization policy

The following policy allows restricted Amazon Q Developer access for selected Slack workspaces and a Microsoft Teams tenant.

{ "chatbot":{ "platforms":{ "slack":{ "client":{ "@@assign":"enabled" }, "workspaces": { // limit 255 "@@assign":[ "Slack-Workspace-Id1", "Slack-Workspace-Id2" ] }, "default":{ "supported_channel_types":{ "@@assign":[ "private" ] }, "supported_role_settings":{ "@@assign":[ "user_role" ] } }, "overrides":{ // limit 255 "Slack-Workspace-Id2":{ "supported_channel_types":{ "@@assign":[ "public", "private" ] }, "supported_role_settings":{ "@@assign":[ "channel_role", "user_role" ] } } } }, "microsoft_teams":{ "client":{ "@@assign":"enabled" }, "tenants":{ // limit 36 "Microsoft-Teams-Tenant-Id":{ // limit 36 "@@assign":[ "Microsoft-Teams-Team-Id" ] } }, "default":{ "supported_role_settings":{ "@@assign":[ "user_role" ] } }, "overrides":{ // limit 36 "Microsoft-Teams-Tenant-Id":{ "Microsoft-Teams-Team-Id":{ "supported_role_settings":{ "@@assign":[ "channel_role", "user_role" ] } } } } } }, "default":{ "client":{ "@@assign":"disabled" } } } }

For Slack

  • The Slack client is enabled.

  • The allowed Slack workspaces are Slack-Workspace-Id1 and Slack-Workspace-Id2.

  • The default settings for Slack are to only allow private channels and User level IAM roles.

  • There is an override for the workspace Slack-Workspace-Id2 that allows both public and private channels as well as both Channel level IAM roles and User level IAM roles.

For Microsoft Team

  • The Microsoft Teams is enabled.

  • The allowed Teams tenants are Microsoft-Teams-Tenant-Id with the team Microsoft-Teams-Team-Id.

  • The default settings are to only allow User level IAM roles.

  • There is an override for the tenant Microsoft-Teams-Tenant-Id that allows both Channel level IAM roles and User level IAM roles for the team Microsoft-Teams-Team-Id.

Additional details

  • The default block at the bottom sets the client to be disabled, which disables Amazon Q Developer across the organization unless overridden at a lower level. This means Amazon Chime is disabled in this example. This default also disables any new chat platform that Amazon Q Developer supports. For example, if Amazon Q Developer supports a new chat platform, this default disables that newly supported chat platform as well.

Enabling chat applications policies

Before you can create chat applications policies, you must first enable them using the AWS Organizations console. For more information, see Enabling a policy type in the AWS Organizations User Guide.

Disabling chat applications policies

If you no longer want to use chat applications policies in your organization, you can disable them to prevent accidental use. For more information, see Disabling a policy type in the AWS Organizations User Guide.