All about Cloud, mostly about Amazon Web Services (AWS)

Account Login to AWS Organizations Created Accounts

 2017-07-16 /  744 words /  4 minutes

The processes related to using AWS Organizations are mostly pretty well documented in the AWS Organizations User Guide. The user guide covers the creation of Organization Units into a hierarchy, creating Accounts and associating them with Organization Units, and the attachment of Service Control Policies. It doesn’t describe the process for Account Login to Accounts created using AWS Organizations in much detail. This post covers this missing detail!

The process falls into three stages:

  • Account Login to the Master Account
  • Switching Roles
  • Assume Role into the new Account

Account Login to the Master Account

The master account, which was used to to access AWS Organizations and create the other accounts in the first place, may already be logged in. The image below shows the AWS Console at first login:

Account Login to the Master Account

The current AWS Identity and Access Management (IAM)tippy(’#ref_e64268f111dff454a3b685a2f2681e3d’, { content: document.getElementById(‘content_e64268f111dff454a3b685a2f2681e3d’).innerHTML, allowHTML: true, arrow: true, duration: [1000, 1000], interactive: true, maxWidth: 400, placement: ‘auto’,}); user is usually shown in the header before an “@” symbol. The AWS Account name or ID is usually shown in the header after the “@” symbol. For security reasons they are both obfuscated in the image above.

A menu opens when you click on the caret (“^”) next to the AWS Account name. The IAM user, the “@” symbol, and the AWS Account name or ID change color:

The User Menu

The menu displays the current IAM User name and the current AWS Account name at the top. They are both obfuscated in this image. Role History contains a list of IAM Roles that I have already assumed, plus the ability to switch to a new IAM Role. The list of roles already assumed is in a similar format as used earlier. The IAM user is shown before an “@” symbol, and the AWS Account name or ID is shown after the “@” symbol.

In the image above, it shows that the user has previously assumed a role called OrganizationAccountAccessRole. The AWS Account shown after the “@” is obfuscated.

Choose “Switch Role” :

Selecting "Switch Role"

Switching Roles

Selecting “Switch Role” brings up a new page:

The Switch Role page

Two items are mandatory:

  • The AWS Account, either name or ID, of the Account to switch to. The AWS Account ID will be visible on the AWS Organizations page, but it makes sense to record it.
  • The name of the IAM Role to assume. When working with AWS Organizations, unless you set a custom IAM Role, AWS Organizations will create an IAM Role for you, called “OrganizationAccountAccessRole”

When switching between multiple IAM Roles on multiple AWS Accounts it can get confusing. To make it easier to track the current account and role, the Display Name will be displayed in the header instead of the standard “user @ account”. A custom background color can also be selected to further differentiate multiple accounts and roles:

Switching Roles

The image above shows the AWS Account ID obfuscated. It shows the default AWS Organizations Role,”OrganizationAccountAccessRole”, and a custom Display Name (“Account1”) and Color (green).

Then select “Switch Role”.

Assume Role into the new Account The custom Display Name (“Account1”) is shown in the custom color (green), in place of the standard “user @ account” that is usually shown in the header.

Assumed Role

Clicking on the caret “^” displays the details:

Assume Role Details

The left hand side of the panel shows the details of the original user, from the master AWS Account. Although obfuscated in this image, it shows the IAM User name of the user logged into the master AWS Account. The master AWS Account name, or ID, is also shown, although it is also obfuscated in this image.

The right hand side of the panel shows the details of the assumed IAM Role. In this example, the default AWS Organizations Role, “OrganizationAccountAccessRole” is displayed. Although obfuscated in this image, it shows the current AWS Account name or ID. The “Back to” option unassumes the IAM Role and returns the user to the state before “Switch Role” was selected.

At this point, IAM can be used to create users that can perform an Account Login to AWS Organizations created Accounts.


Tags:  aws  organization  identity  access  management  iam  account  role  user  login
Categories:  AWS  Management  AWS Organizations  AWS Identity and Access Management (IAM)

 Top Ten Tags

AWS (43)   Kinesis (9)   Streams (8)   AWS Console (5)   Go (5)   Analytics (4)   Data (4)   database (4)   Amazon DynamoDB (3)   Amazon Elastic Compute Cloud (EC2) (3)  


All Tags (173)

Disclaimer

All data and information provided on this site is for informational purposes only. cloudninja.cloud makes no representations as to accuracy, completeness, currentness, suitability, or validity of any information on this site and will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use. All information is provided on an as-is basis.

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. My opinions may change over time.