A new model request lands on your desk. You open SageMaker, push some data from Domino, and realize half your team needs permission changes before anyone can reproduce it. Hours gone. Domino Data Lab and SageMaker should work like a single machine, not a relay race of IAM tickets.
At their core, Domino Data Lab handles enterprise-scale data science orchestration, while Amazon SageMaker powers managed model training and deployment. Domino gives you reproducibility, version control, and governed notebooks. SageMaker supplies elastic compute, managed endpoints, and access to AWS’s native AI ecosystem. Integrated right, they deliver a workflow that’s both compliant and fast—two words that don’t often sit together in the same sentence.
The usual Domino–SageMaker setup starts with identity. Domino uses Okta or any OIDC provider to authenticate users, while SageMaker relies on AWS IAM roles. The trick is mapping those identities without creating IAM sprawl. Use Domino’s external compute integration to delegate workloads into SageMaker under managed roles. That keeps audit trails clean and eliminates hard-coded credentials. Models trained through that bridge inherit Domino’s metadata, lineage, and tags for governance. When done right, a model’s journey from notebook to endpoint is traceable without ever exposing raw keys or temporary tokens.
How do I connect Domino Data Lab and SageMaker securely?
Set up an external compute environment in Domino that points to your SageMaker execution role. Ensure the role includes least-privilege access to S3 buckets and training instances. Configure Domino’s launcher to pass through user identity via federated tokens. The outcome is a reproducible and fully logged training session that meets SOC 2 and internal RBAC reviews.
Troubleshooting usually means fixing IAM boundaries. If permissions error out, verify that Domino’s execution role trusts the right AWS account and that SageMaker’s service role can assume it. Rotate credentials quarterly and log all temporary tokens for review. Keep identity mapping in version control like any other piece of infrastructure code.