Loading image...Kiro
  • CLI
  • Powers
  • Autonomous agent
  • Enterprise
  • Pricing
  • Docs
SIGN INDOWNLOADS
Loading image...Kiro
Loading image...Kiro
Product
  • About Kiro
  • CLI
  • Powers
  • Autonomous agent
  • Pricing
  • Downloads
For
  • Enterprise
  • Startups
  • Students
Community
  • Overview
  • Showcase
  • Discord
  • Events
Resources
  • Documentation
  • Blog
  • Changelog
  • FAQs
  • Report a bug
  • Suggest an idea
  • Billing support
Social
Site TermsLicenseResponsible AI PolicyLegalPrivacy PolicyCookie Preferences
  1. Docs
  2. Autonomous agent
  3. Firewalls

Configuring a firewall, proxy server, or data perimeter for Kiro

On this page
  • Network traffic overview
  • Core URLs
  • Social sign-in
  • IAM Identity Center
  • External identity providers
  • AWS GovCloud
  • AWS GovCloud
  • Subscription management
  • Optional URLs
  • Proxy configuration
  • Data perimeters
  • Optional URLs
  • Proxy configuration
  • Data perimeters
  • Wildcard rules

If your network uses a firewall, proxy server, or data perimeter, you need to allowlist specific URLs so Kiro can reach its backend services. This page lists every domain Kiro contacts, grouped by function.

Network traffic overview

Kiro makes two types of outbound connections:

  • Agent traffic — Requests from the Kiro Autonomous Agent to backend services (AI, telemetry, authentication).
  • Browser traffic — Sign-in uses your browser. This traffic uses your OS network stack.

Your firewall must allow both at the network level.

Core URLs

Every Kiro Autonomous Agent deployment needs the following URLs. These cover the agent application, sign-in, AI services, and telemetry.

URLPurpose
app.kiro.devSign-in portal
assets.app.kiro.devAgent application assets (primary)
kaa-assets.app.kiro.devAgent application assets (primary)
kiro.devKiro website and documentation
prod.us-east-1.auth.desktop.kiro.devToken exchange, refresh, and logout
kiro-prod-us-east-1.auth.us-east-1.amazoncognito.comCognito authentication
management.us-east-1.kiro.devConfiguration, access management
q.*.amazonaws.comKiro service endpoints
prod.us-east-1.telemetry.kiro.aws.devTelemetry and metrics
prod.download.desktop.kiro.devDownloads and updates
a0.awsstatic.comAWS static assets
prod.assets.shortbread.aws.devCookie consent assets
prod.log.shortbread.aws.devCookie consent logging
prod.tools.shortbread.aws.devCookie consent tools
rendering.aperture-public-api.feedback.console.aws.devFeedback form

If your network policy allows wildcard rules, you can allowlist *.kiro.dev instead of the individual kiro.dev domains above.

Social sign-in

If you sign in with Google or GitHub, allowlist this additional endpoint for the Cognito identity federation flow.

URLPurpose
cognito-identity.us-east-1.amazonaws.comFederated identity for social sign-in

IAM Identity Center

If your organization uses AWS IAM Identity Center for authentication, allowlist these additional endpoints.

Replace idc-directory-id-or-alias with your IAM Identity Center instance's directory ID or alias, and sso-region with the AWS Region where your instance is enabled. For more information, see What is IAM Identity Center? in the IAM Identity Center User Guide.

URLPurpose
<region>.signin.awsAWS sign-in
<idc-directory-id-or-alias>.awsapps.comIAM Identity Center portal
oidc.<sso-region>.amazonaws.comOIDC token exchange

External identity providers

If your organization uses an external identity provider (IdP) with IAM Identity Center, the sign-in flow redirects through your IdP's domain. You need to allowlist that domain too.

Identity providerDomain to allowlist
Microsoft Entra IDlogin.microsoftonline.com
Okta<your-org>.okta.com

Check with your identity team for the exact domain if you are unsure which IdP is configured.

Subscription management

If you sign in with Google, GitHub, or AWS Builder ID, Kiro uses Stripe for subscription billing. Allowlist these domains to access the billing portal and upgrade plans.

URLPurpose
billing.stripe.comBilling portal for paid plans
checkout.stripe.comCheckout for plan upgrades

Enterprise customers using IAM Identity Center don't need these domains.

Wildcard rules

If your network policy allows wildcard rules, you can simplify the allowlist:

WildcardCovers
*.kiro.devAll Kiro domains
*.kiro.aws.devTelemetry endpoints
q.*.amazonaws.comKiro service endpoints
*.shortbread.aws.devCookie consent
*.signin.awsIAM Identity Center sign-in
Page updated: April 29, 2026
Data protection