Skip to content

Kiro subscription assignment fails on Organizations management account and routes to standalone CreateAssignment path #7089

@imtaxu

Description

@imtaxu

Before opening, please confirm:

Operating System

MacOS Tahoe 26.3.1

Kiro Version

0.11.107

Bug Description

I cannot assign a paid Kiro subscription to a user or group from AWS IAM Identity Center.

The subscription flow fails from the Kiro console with:
“Failed to create Kiro subscription for 1 user”

What seems unusual is that this AWS account is not a plain standalone account. It is currently the management account of an AWS Organization. However, the failing backend call appears to use a standalone Amazon Q Developer subscription path.

This does not look like a basic IAM Identity Center setup issue, because user/group discovery works correctly in the Kiro console and the required service-linked roles already exist.

Steps to Reproduce

  1. Open the Kiro console in AWS.
  2. Go to Users & Groups.
  3. Click Add user or Add group.
  4. Select a paid Kiro plan.
  5. Select an IAM Identity Center user or group.
  6. Click Assign.
  7. Observe that the subscription creation fails with:
    “Failed to create Kiro subscription for 1 user”

Additional verification:

  • The same failure happens for both USER and GROUP assignment.
  • The same failure happens with different paid Kiro plans.
  • IAM Identity Center is configured in us-east-1.
  • The user and group are discoverable from the Kiro console.
  • The service-linked roles AWSServiceRoleForAmazonQDeveloper and AWSServiceRoleForUserSubscriptions already exist.
  • aws organizations describe-organization confirms this account is the management account of an AWS Organization.

Expected Behavior

Kiro should successfully assign the selected paid subscription to the chosen IAM Identity Center user or group.

If the account is not eligible for some reason, the console should return a clear and specific error explaining the exact requirement that is not being met.

Conversation ID

N/A

This issue did not originate from a Kiro IDE conversation. It occurs in the AWS/Kiro subscription assignment flow from the console.

Additional Context

CloudTrail shows the failed backend call as:

  • eventSource: q.amazonaws.com
  • eventName: CreateAssignment
  • errorCode: AccessDenied
  • errorMessage: Account does not meet requirements for this operation

Example request parameters include:

  • principalType: USER or GROUP
  • subscriptionType: Q_DEVELOPER_STANDALONE_POWER

I do not see a corresponding CreateClaim event.

This is why the issue looks suspicious: the AWS account is in an Organizations management-account context, but the failing backend request appears to use a standalone subscription type.

I also noticed that the IAM Identity Center Kiro application link redirects to the AWS Q Developer page.

This may be related to:

Please check whether paid Kiro subscription assignment for this account is being routed through the wrong backend path, or whether the account state is inconsistent on the backend.

I can provide redacted screenshots and CloudTrail details if needed.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions