You know that sinking feeling when a production bug hits and half the team is locked out of the server because nobody remembers whose SSH key actually works. That is the exact moment EC2 Systems Manager and Phabricator can save you. Together they remove the guesswork, the shared passwords, and the late-night IAM edits that nobody dares to undo.
EC2 Systems Manager gives you centrally managed sessions into AWS instances without a single open port. Phabricator provides project workflow and review automation with fine-grained access tracking. When you connect them, you get auditable command execution tied to real developer identity, not generic EC2 roles. It feels like finally wiring your infrastructure to understand who did what—and when.
Here’s the logic behind the integration. Systems Manager Session Manager uses AWS IAM to grant remote access through policy, not credentials. Phabricator users map to those IAM identities using your existing directory or SSO provider like Okta or Google Workspace. Permissions are synced through tags or roles, then Systems Manager executes sessions on behalf of the verified identity. Every log automatically reflects both the AWS role context and the Phabricator user metadata. No local secrets, no forgotten keys.
If your instance policies start misbehaving, audit through CloudTrail. When Phabricator users report “access denied,” check that their IAM session includes the necessary SSM permissions (StartSession, SendCommand, DescribeInstanceInformation). Rotating roles every quarter protects your least-privileged principle and keeps SOC 2 and ISO audits painless.
Key benefits you’ll notice quickly: