Loading image...Kiro
  • CLI
  • Powers
  • Autonomous agent
  • Enterprise
  • Pricing
  • Docs
SIGN INDOWNLOADS
Loading image...Kiro
Loading image...Kiro
Product
  • About Kiro
  • CLI
  • Powers
  • Autonomous agent
  • Pricing
  • Downloads
For
  • Enterprise
  • Startups
  • Students
Resources
  • Documentation
  • Blog
  • Changelog
  • FAQs
  • Report a bug
  • Suggest an idea
  • Billing support
Social
Site TermsLicenseResponsible AI PolicyLegalPrivacy PolicyCookie Preferences
  1. Docs
  2. CLI
  3. Privacy and security
  4. Firewalls, proxies, and data perimeters

Configuring a firewall, proxy server, or data perimeter for Kiro

On this page
  • Network traffic overview
  • Core URLs
  • IAM Identity Center
  • External identity providers
  • AWS GovCloud
  • Subscription management
  • Optional URLs
  • Proxy configuration
  • Data perimeters

If your network uses a firewall, proxy server, or data perimeter, you need to allowlist specific URLs so Kiro can reach its backend services. This page lists every domain Kiro contacts, grouped by function.

Network traffic overview

Kiro makes two types of outbound connections:

  • IDE traffic — Requests from the Kiro process (chat, completions, telemetry, updates, extensions). This traffic respects your proxy settings.
  • Browser traffic — Sign-in opens your default browser. This traffic uses your OS network stack and bypasses IDE proxy settings.

Your firewall must allow both at the network level.

Core URLs

Every Kiro installation needs the following URLs. These cover sign-in, chat and code assistance, telemetry, and auto-updates.

URLPurposeTraffic type
app.kiro.devSign-in portalBrowser
prod.us-east-1.auth.desktop.kiro.devToken exchange, refresh, and logoutIDE
prod.us-east-1.telemetry.desktop.kiro.devTelemetryIDE
prod.download.desktop.kiro.devAuto-updates, Powers registry, and iconsIDE
q.us-east-1.amazonaws.comKiro service (US East)IDE
q.eu-central-1.amazonaws.comKiro service (Europe)IDE

If your network policy allows wildcard rules, you can allowlist *.kiro.dev instead of the first four individual domains.

IAM Identity Center

If your organization uses AWS IAM Identity Center for authentication, allowlist these additional endpoints.

Replace idc-directory-id-or-alias with your IAM Identity Center instance's directory ID or alias, and sso-region with the AWS Region where your instance is enabled. For more information, see What is IAM Identity Center? in the IAM Identity Center User Guide.

URLPurpose
<idc-directory-id-or-alias>.awsapps.comIAM Identity Center portal
oidc.<sso-region>.amazonaws.comOIDC token exchange

External identity providers

If your organization uses an external identity provider (IdP) with IAM Identity Center, the sign-in flow redirects through your IdP's domain. You need to allowlist that domain too.

Identity providerDomain to allowlist
Microsoft Entra IDlogin.microsoftonline.com
Okta<your-org>.okta.com

Check with your identity team for the exact domain if you are unsure which IdP is configured.

AWS GovCloud

If you use AWS GovCloud (US), allowlist these FIPS-compliant endpoints instead of the commercial Kiro service endpoints in the Core URLs table:

  • q-fips.us-gov-east-1.amazonaws.com
  • q-fips.us-gov-west-1.amazonaws.com

Subscription management

If you sign in with Google, GitHub, or AWS Builder ID, Kiro uses Stripe for subscription billing. Allowlist these domains to access the billing portal and upgrade plans.

URLPurpose
billing.stripe.comBilling portal for paid plans
checkout.stripe.comCheckout for plan upgrades

Enterprise customers using IAM Identity Center don't need these domains.

Optional URLs

You only need these if you use the corresponding Kiro feature. Skip any that don't apply to your environment.

URLFeaturePurpose
open-vsx.orgExtensionsSearch and metadata
openvsx.eclipsecontent.orgExtensionsIcons and VSIX downloads
github.comPowers / MCPRepository cloning
raw.githubusercontent.comPowers / MCPConfig files and readme images

Proxy configuration

Kiro respects standard proxy environment variables for all IDE traffic:

  • HTTP_PROXY
  • HTTPS_PROXY
  • NO_PROXY

You can also configure proxy settings in Settings > Proxy inside Kiro.

Browser-based sign-in bypasses proxy settings

When you sign in, Kiro opens your default browser to app.kiro.dev. This browser traffic uses your operating system's network stack, not the IDE's proxy configuration. Your firewall must allow the IAM Identity Center URLs and app.kiro.dev at the network level regardless of how the IDE proxy is configured.

Data perimeters

If you use data perimeters on AWS to restrict access to trusted identities and resources, make sure your policies allow Kiro's service principals to reach the endpoints listed on this page. For VPC-level controls, see VPC endpoints (AWS PrivateLink).

Page updated: March 6, 2026
IAM permissions
VPC endpoints (AWS PrivateLink)