AWS MCP Server
AWS-managed preview MCP for AWS documentation, authenticated AWS API calls, CloudWatch and CloudTrail troubleshooting, and Agent SOP workflows.
Installation path
For Cosmos cloud sessions, add AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY as string secrets at app.augmentcode.com/app/secrets and set them as env vars. For local CLI use, configure credentials with aws login, aws configure sso, or aws configure. Then choose Add Server, select Local MCP, install uv, use uvx as the command, and pass mcp-proxy-for-aws@latest, https://aws-mcp.us-east-1.api.aws/mcp, --metadata, and AWS_REGION=<region> as arguments.
Setup steps
- 01
Install uv
uv ships uvx: install with brew install uv or pipx install uv.
- 02
Set up AWS credentials
For Cosmos cloud sessions: go to app.augmentcode.com/app/secrets and add AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY as string secrets (and AWS_SESSION_TOKEN if using temporary credentials). You will reference these as env vars in the next steps. For local CLI-only use: run aws configure sso, aws login, or aws configure instead: the server will pick up credentials from ~/.aws/credentials automatically.
- 03
Open Add Server
Configuration → MCP Registry → Add Server in Cosmos.
- 04
Pick the Local MCP tab
- 05
Set the command
Command
uvx - 06
Add the arguments
Args
mcp-proxy-for-aws@latest https://aws-mcp.us-east-1.api.aws/mcp --metadata AWS_REGION=<region> - 07
Set environment variables (Cosmos cloud only)
If using Cosmos cloud sessions, set these env vars to the secret values you created. The server will use them for SigV4 signing instead of the local credentials file.
AWS_ACCESS_KEY_ID
AWS_ACCESS_KEY_ID=your-access-key-idAWS_SECRET_ACCESS_KEY
AWS_SECRET_ACCESS_KEY=your-secret-access-keyAWS_SESSION_TOKEN
AWS_SESSION_TOKEN=your-session-token - 08
Click Add, then enable
Toggle on Cosmos Agent or CLI.
Local command
Suggested name: aws-mcp
uvx mcp-proxy-for-aws@latest https://aws-mcp.us-east-1.api.aws/mcp --metadata AWS_REGION=us-west-2AWS MCP Server is in preview and uses SigV4 through MCP Proxy for AWS. For Cosmos cloud sessions, store AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY as string secrets at app.augmentcode.com/app/secrets and set them as env vars: the VM cannot access your local ~/.aws/credentials file. For local CLI use, credentials from aws configure or aws login are picked up automatically.
Authentication
AWS credentials via SigV4. For Cosmos cloud sessions, store AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY as string secrets at app.augmentcode.com/app/secrets and set them as env vars. For local CLI only, run aws login, aws configure sso, or aws configure: credentials are read from ~/.aws/credentials automatically.
| Variable | Example | Required |
|---|---|---|
| AWS_ACCESS_KEY_ID | your-access-key-id | Yes |
| AWS_SECRET_ACCESS_KEY | your-secret-access-key | Yes |
| AWS_SESSION_TOKEN | your-session-token | Yes |