Organizations with users in multiple geographies face data residency requirements such as General Data Protection Regulation (GDPR) in Europe, country-specific data sovereignty laws, and internal compliance policies. Amazon Quick with Microsoft 365 extensions supports Regional routing to meet these requirements.
Amazon Quick supports multi-Region deployments so you can route users to AWS Region-specific Amazon Quick resources (Quick chat agents, Quick Flows, knowledge bases, and more). Regulated industries such as financial services, healthcare, energy, and telecommunications commonly use this pattern to keep data within specific geographical boundaries.
If you integrate Amazon Quick with Microsoft 365 applications, in this instance Microsoft Teams, users must authenticate and connect to their appropriate Regional Amazon Quick resources. Regional routing makes sure users access the chat agents and resources they build in their Amazon Quick Region. In this post, we will show you how to enforce data residency when deploying Amazon Quick Microsoft Teams extensions across multiple AWS Regions. You will learn how to configure multi-Region Amazon Quick extensions that automatically route users to AWS Region-appropriate resources, helping keep compliance with GDPR and other data sovereignty requirements.
In this post, we present a real-world example with MyCompany, a fictional global organization with European headquarters accessing Amazon Quick in the Europe (Ireland) Region (eu-west-1) and a US branch in the US East (N. Virginia) Region (us-east-1). A single Amazon Quick account has AWS Region-specific chat agents (MyCompany-Knowledge-Agent-eu-west-1 and MyCompany-Knowledge-Agent-us-east-1) containing localized corporate information.
Regional routing requires AWS IAM Identity Center with a trusted token issuer (TTI) for cross-system authentication. This post uses Microsoft Entra ID for group-based access control to demonstrate how organizations can automatically route users to their appropriate AWS Regions, though other identity management approaches are possible. This post focuses on the Amazon Quick extension for Microsoft Teams as the primary example.
The following architecture diagram demonstrates how to automate user routing across multiple AWS Regions by integrating Microsoft Entra ID with IAM Identity Center. By using Microsoft Entra ID group membership to direct users to their designated Regional Amazon Quick deployments, you can maintain data residency within specific geographic boundaries while providing a consistent experience for your global workforce.

To implement this design, you will follow a multi-phase process that begins with AWS Management Console configuration and concludes with the deployment of Regional add-ons to your users. At a high level, this post shows you how to configure identity and trust one time, then repeat a small set of Regional steps per AWS Region. The following steps summarize the high-level workflow:
[YOUR_COMPANY_NAME]-Teams-[AWS_REGION]) to your Regional user groups through Microsoft Entra ID.[YOUR_COMPANY_NAME]-Teams-[AWS_REGION] Agent) to grant users access to localized data.Your AWS environment must have Amazon Quick active in your target AWS Regions, along with the identity and secret management services used to handle Regional authentication. For AWS services, you must have the following in place:
For Microsoft 365, you must have the following for admin access:
We start by establishing the shared identity foundation used by every AWS Region. In this first step, you create a Microsoft Entra ID application. The Microsoft 365 extensions use the Microsoft Entra ID application to authenticate users against Amazon Quick through IAM Identity Center. Complete the following steps to create your application:
https://qbs-cell001.dp.appintegrations.[AWS_REGION].prod.plato.ai.aws.dev/auth/idc-tti/callback:
https://qbs-cell001.dp.appintegrations.eu-west-1.prod.plato.ai.aws.dev/auth/idc-tti/callbackhttps://qbs-cell001.dp.appintegrations.us-east-1.prod.plato.ai.aws.dev/auth/idc-tti/callbackMicrosoft Entra ID uses the callback URLs to return the user’s sign-in response to IAM Identity Center for the correct AWS Region (eu-west-1 or us-east-1). Use these exact URLs—they are the actual values required for Amazon Quick deployments.


In subsequent steps, you will need your Microsoft tenant ID, application client ID, and client secret value.
In this step, you create trusted token issuers in IAM Identity Center. A trusted token issuer is a configuration in IAM Identity Center that validates tokens issued by Microsoft Entra ID. You can use it for cross-system authentication, so users can move between Microsoft 365 and AWS without repeated sign-ins. Complete the following steps to configure the trusted token issuer with your Microsoft tenant’s issuer URL and map the email attribute:
https://login.microsoftonline.com/[YOUR_TENANT_ID]/v2.0, using the tenant ID you retrieved from the previous step.[YOUR_COMPANY_NAME]-MS365Extensions-Trust-Token-Issuer, using your company name.This configuration applies to each AWS Region where you will be deploying the extensions.

With the global identity components in place, you can now configure each AWS Region with its own secrets, roles, and extension settings that enforce data residency for each geographic AWS Region.
In this step, you create the necessary secrets to store Microsoft 365 extension credentials and IAM permissions that grant read access to secrets.
Create one secret per AWS Region (eu-west-1 and us-east-1) in Secrets Manager following the name convention [YOUR_COMPANY_NAME]/MS365/Extensions/[AWS_REGION]:
{
"client_id":"[YOUR_CLIENT_ID]",
"client_secret":"[YOUR_CLIENT_SECRET]"}
Create an IAM policy called [YOUR_COMPANY_NAME]-MS365-Extensions-Policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "SecretManagerPermissions",
"Effect": "Allow",
"Action": [
"secretsmanager:GetSecretValue"
],
"Resource": [
"[SECRET_EU_WEST_1_ARN]",
"[SECRET_US_EAST_1_ARN]"
]
},
{
"Sid": "TokenIssuerPermissions",
"Effect": "Allow",
"Action": [
"sso:DescribeTrustedTokenIssuer"
],
"Resource": "[YOUR_TTI_ARN]"
}
]
}
Use the following trust relationship:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": [
"eu-west-1.prod.appintegrations.plato.aws.internal",
"us-east-1.prod.appintegrations.plato.aws.internal",
]
},
"Action": "sts:AssumeRole",
"Condition": {}
}
]
}
Each time you activate a new AWS Region, you must create a new secret in Secrets Manager and add the new secret Amazon Resource Name (ARN) to the Resource list in the IAM policy. You must also add the new AWS Region you want to activate to the Service field in the IAM role trust relationship. This field identifies the Regional Service Principal, which is the specific AWS service identity (for example, eu-west-1.prod.appintegrations.plato.aws.internal) that requires permission to assume your IAM roles in that specific AWS Region.
Take note of the created IAM role ARN. You will need it in the next step.
Complete the following steps to create Amazon Quick managed extensions for Microsoft Teams:
The Audience (Aud) claim is a security identifier that validates the authentication token is only used by the specific application it was intended for, preventing unauthorized access from other entities. These settings are shared across extension accesses in this AWS Region.



This process creates an Enterprise application in Microsoft Entra ID with the unique URLs and instructions Microsoft 365 Teams needs to communicate with the specific Regional AWS assets. Application installation requires permissions to install an Enterprise application in Microsoft Entra ID.

When the installation is complete, the following entry will be displayed in the Microsoft Entra ID Enterprise application.

us-east-1 Region. Follow the same naming convention with the AWS Region suffix, and use the secret ARN for the us-east-1 Region.
After the Regional applications are deployed, you create the AWS Region-specific chat agents that each add-on will access. Each AWS Region maintains its own agent with localized knowledge bases. Complete the following steps:
eu-west-1.eu-west-1 with European corporate knowledge. The naming convention includes the AWS Region identifier for easy management across multiple Regions: [YOUR_COMPANY_NAME]-Knowledge-Agent-eu-west-1.
us-east-1 with US-specific corporate information, called [YOUR_COMPANY_NAME]-Knowledge-Agent-us-east-1.
The final step is deploying the correct Regional add-on to the correct user group in Microsoft 365.
In the last step, you assign each Microsoft Teams application to their respective Regional groups. Complete the following steps:

eu-west-1 Region) and choose Edit Availability.
us-east-1 Region.The following screenshot shows what the configuration will look like in Microsoft Teams Admin Center.

After deployment propagates, you can validate that users are automatically routed to the correct Regional agent.
EU users can use MyCompany-Teams-eu-west-1 agent when they are interacting with the Microsoft Teams extension. The plugin will select the My Assistant chat agent as default, so you must choose the settings (gear) icon and choose the MyCompany-Knowledge-Agent-eu-west-1 chat agent.


The following screenshot shows an example of interacting with the chat agent.

US users can use the MyCompany-Knowledge-Agent-us-east-1 chat agent, demonstrating successful Regional routing without manual configuration.
The following tips can help you troubleshoot some common issues you might encounter while setting up Amazon Quick extensions:
To avoid ongoing charges, clean up the resources you created as part of this post if you no longer need them.
This multi-Region Amazon Quick extension solution for Microsoft 365 provides compliant, AWS Region-aware AI capabilities to your global workforce. The architecture and implementation steps in this post show how to integrate enterprise AI with productivity tools while maintaining data residency and compliance boundaries.
For more details on AI-powered assistants that enhance productivity without switching applications, refer to Extension access. Refer to Getting started with Amazon Quick to start using Amazon Quick today.
Manuel Rioux est fièrement propulsé par WordPress