You know the moment. Someone on the team needs to SSH into an EC2 host, the credentials are buried in an encrypted note, and the IAM roles look like a crossword puzzle in JSON. All you wanted was secure, repeatable access. That is where EC2 Systems Manager OneLogin comes in. It cuts through the chaos with identity-aware automation that feels almost too clean for AWS.
EC2 Systems Manager lets you manage instances without direct SSH or RDP, using a service called Session Manager. OneLogin provides identity and access management through SAML, OIDC, and MFA. Combined, they turn AWS instance control into a controlled pipeline: users sign in with corporate identity, get temporary credentials mapped via IAM roles, and start sessions without exchanging keys. It is a trust model that scales.
How the integration fits together
When EC2 Systems Manager and OneLogin are tied through OIDC or SAML federation, authentication flows start with OneLogin verifying who you are. AWS assigns fine-grained permissions through IAM. Session Manager then launches a secure tunnel into the instance using those temporary credentials. Logs and session history land in CloudWatch, and the user never touches a raw PEM file. The elegance is in what you don’t need anymore.
To connect them, admins typically configure OneLogin as a custom identity provider, link roles with SAML assertions, and restrict access at the Systems Manager level. It is the trifecta of compliance, accountability, and speed. SOC 2 auditors love it. Engineers love not having to find the right key.
Quick answer
To integrate EC2 Systems Manager with OneLogin, set up OneLogin as your AWS SAML provider, map IAM roles for each user group, and route access through Session Manager. That gives passwordless EC2 access verified by organizational identity, not static credentials.