cloud:aws:iam
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
cloud:aws:iam [2023/11/01 07:13] – removed - external edit (Unknown date) 127.0.0.1 | cloud:aws:iam [2023/11/01 07:13] (current) – ↷ Page moved from business_process_management:camunda:cloud:aws:iam to cloud:aws:iam skipidar | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ====== IAM ====== | ||
+ | |||
+ | |||
+ | ===== how to evaluate Deny and Allow statements in one policy? ===== | ||
+ | |||
+ | |||
+ | Here's how IAM evaluates policies containing " | ||
+ | |||
+ | **Default Deny**: By default, access to AWS resources is denied. If there are no policies attached to a user, group, or role, or if no policies explicitly grant access, AWS denies the action. | ||
+ | |||
+ | **" | ||
+ | |||
+ | **" | ||
+ | |||
+ | |||
+ | |||
+ | ===== how to manage single sign on SSO across accounts? ===== | ||
+ | |||
+ | To SSO into accounts with limited permissions use | ||
+ | |||
+ | In the "IAM Identity Center": | ||
+ | |||
+ | As described here: https:// | ||
+ | |||
+ | |||
+ | This is how the management of the organization looks like. | ||
+ | {{https:// | ||
+ | |||
+ | |||
+ | I have striked through the entry URL which is used to SSO into the organization. | ||
+ | |||
+ | The URL looks like | ||
+ | < | ||
+ | https:// | ||
+ | </ | ||
+ | where you can pick the " | ||
+ | |||
+ | |||
+ | === SSO from a CMD / Shell === | ||
+ | |||
+ | When the setup is done \\ | ||
+ | then trigger login from console \\ | ||
+ | will allow you to get credentials **for the console** via SSO \\ | ||
+ | or for the programmatic access | ||
+ | |||
+ | SSO from the command line like this: | ||
+ | < | ||
+ | $ aws sso login --profile default | ||
+ | |||
+ | Attempting to automatically open the SSO authorization page in your default browser. | ||
+ | If the browser does not open or you wish to use a different device to authorize this request, open the following URL: | ||
+ | |||
+ | https:// | ||
+ | |||
+ | Then enter the code: | ||
+ | |||
+ | ABCD-CPZB | ||
+ | </ | ||
+ | |||
+ | After the login with your global user (which you manage in your IAM identity center https:// | ||
+ | you will be redirected to the SSO page | ||
+ | |||
+ | {{https:// | ||
+ | |||
+ | From where you can approve the request: | ||
+ | |||
+ | {{https:// | ||
+ | |||
+ | Dont forget to log out: | ||
+ | |||
+ | < | ||
+ | $ aws sso logout | ||
+ | </ | ||
+ | |||
+ | |||
+ | === SSO to AWS management console === | ||
+ | |||
+ | To SSO into the AWS console - your also can navigate directly to \\ | ||
+ | and pick one of the available role to SSO into the AWS management console. | ||
+ | |||
+ | {{https:// | ||
+ | |||
+ | |||
+ | |||
+ | ==== Setting up SSO via " | ||
+ | |||
+ | As in https:// | ||
+ | |||
+ | |||
+ | To make the terraform work - you need a profile without " | ||
+ | |||
+ | as stated in https:// | ||
+ | |||
+ | |||
+ | |||
+ | **Leave "SSO session name" empty!!** | ||
+ | |||
+ | < | ||
+ | $ aws configure sso --profile default | ||
+ | |||
+ | SSO session name (Recommended): | ||
+ | WARNING: Configuring using legacy format (e.g. without an SSO session). | ||
+ | Consider re-running " | ||
+ | |||
+ | SSO start URL [None]: https:// | ||
+ | SSO region [None]: eu-central-1 | ||
+ | Attempting to automatically open the SSO authorization page in your default browser. | ||
+ | If the browser does not open or you wish to use a different device to authorize this request, open the following URL: | ||
+ | |||
+ | https:// | ||
+ | |||
+ | Then enter the code: | ||
+ | |||
+ | XXXX-XXXX | ||
+ | |||
+ | <select role> | ||
+ | Using the role name " | ||
+ | CLI default client Region [None]: <default region> | ||
+ | CLI default output format [None]: <default output> | ||
+ | |||
+ | To use this profile, specify the profile name using --profile, as shown: | ||
+ | |||
+ | aws s3 ls --profile default | ||
+ | |||
+ | </ | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | Associated | ||
+ | |||
+ | ~/ | ||
+ | |||
+ | < | ||
+ | [default] | ||
+ | region = eu-central-1 | ||
+ | sso_start_url = https:// | ||
+ | sso_region = eu-central-1 | ||
+ | sso_account_id = 36********63 | ||
+ | output = json | ||
+ | sso_role_name = Admin-NoIAM-NoBilling | ||
+ | |||
+ | </ | ||
+ | |||
+ | |||
+ | == Provisioning the permission sets == | ||
+ | |||
+ | Newly defined permission sets remain in the "not provisioned" | ||
+ | |||
+ | {{https:// | ||
+ | |||
+ | |||
+ | To become available anywhere - they must be explicitly assigned to an account. | ||
+ | |||
+ | {{https:// | ||
+ | |||
+ | {{https:// | ||
+ | |||
+ | {{https:// | ||
+ | |||
+ | Only then the permission sets become " | ||
+ | |||
+ | {{https:// | ||