All posts

How to configure Domino Data Lab SageMaker for secure, repeatable access

A new model request lands on your desk. You open SageMaker, push some data from Domino, and realize half your team needs permission changes before anyone can reproduce it. Hours gone. Domino Data Lab and SageMaker should work like a single machine, not a relay race of IAM tickets. At their core, Domino Data Lab handles enterprise-scale data science orchestration, while Amazon SageMaker powers managed model training and deployment. Domino gives you reproducibility, version control, and governed

Free White Paper

VNC Secure Access + Customer Support Access to Production: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

A new model request lands on your desk. You open SageMaker, push some data from Domino, and realize half your team needs permission changes before anyone can reproduce it. Hours gone. Domino Data Lab and SageMaker should work like a single machine, not a relay race of IAM tickets.

At their core, Domino Data Lab handles enterprise-scale data science orchestration, while Amazon SageMaker powers managed model training and deployment. Domino gives you reproducibility, version control, and governed notebooks. SageMaker supplies elastic compute, managed endpoints, and access to AWS’s native AI ecosystem. Integrated right, they deliver a workflow that’s both compliant and fast—two words that don’t often sit together in the same sentence.

The usual Domino–SageMaker setup starts with identity. Domino uses Okta or any OIDC provider to authenticate users, while SageMaker relies on AWS IAM roles. The trick is mapping those identities without creating IAM sprawl. Use Domino’s external compute integration to delegate workloads into SageMaker under managed roles. That keeps audit trails clean and eliminates hard-coded credentials. Models trained through that bridge inherit Domino’s metadata, lineage, and tags for governance. When done right, a model’s journey from notebook to endpoint is traceable without ever exposing raw keys or temporary tokens.

How do I connect Domino Data Lab and SageMaker securely?
Set up an external compute environment in Domino that points to your SageMaker execution role. Ensure the role includes least-privilege access to S3 buckets and training instances. Configure Domino’s launcher to pass through user identity via federated tokens. The outcome is a reproducible and fully logged training session that meets SOC 2 and internal RBAC reviews.

Troubleshooting usually means fixing IAM boundaries. If permissions error out, verify that Domino’s execution role trusts the right AWS account and that SageMaker’s service role can assume it. Rotate credentials quarterly and log all temporary tokens for review. Keep identity mapping in version control like any other piece of infrastructure code.

Continue reading? Get the full guide.

VNC Secure Access + Customer Support Access to Production: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Benefits of pairing Domino Data Lab with SageMaker

  • Unified governance of experiments and models
  • Faster model deployment with no credential handoffs
  • Clear audit trails for compliance and incident response
  • Reduced compute waste via controlled external workloads
  • Consistent permissions across cloud and on-prem environments
  • Lower cognitive load for teams managing hybrid footprints

With this setup, developer velocity jumps. Engineers stop juggling keys and start focusing on experiments. No more emailing screenshots of IAM policies to Ops. Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. They tie together Domino’s identity federation and SageMaker’s API-level permissions without fragile scripts or manual approvals.

AI workloads benefit most when access is predictable. Agents that assist with data labeling or prompt optimization stay within defined scopes. No accidental data leaks, no surprise permissions, just repeatable model runs with visible lineage.

When Domino Data Lab and SageMaker share a common security layer, your team gains trust in its workflow. And trust, in infrastructure, is another word for speed.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts