cloud:aws:iam
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revision | |||
| cloud:aws:iam [2023/11/01 07:13] – removed - external edit (Unknown date) 127.0.0.1 | cloud:aws:iam [2023/11/01 07:13] (current) – ↷ Page moved from business_process_management:camunda:cloud:aws:iam to cloud:aws:iam skipidar | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | ====== IAM ====== | ||
| + | |||
| + | |||
| + | ===== how to evaluate Deny and Allow statements in one policy? ===== | ||
| + | |||
| + | |||
| + | Here's how IAM evaluates policies containing " | ||
| + | |||
| + | **Default Deny**: By default, access to AWS resources is denied. If there are no policies attached to a user, group, or role, or if no policies explicitly grant access, AWS denies the action. | ||
| + | |||
| + | **" | ||
| + | |||
| + | **" | ||
| + | |||
| + | |||
| + | |||
| + | ===== how to manage single sign on SSO across accounts? ===== | ||
| + | |||
| + | To SSO into accounts with limited permissions use | ||
| + | |||
| + | In the "IAM Identity Center": | ||
| + | |||
| + | As described here: https:// | ||
| + | |||
| + | |||
| + | This is how the management of the organization looks like. | ||
| + | {{https:// | ||
| + | |||
| + | |||
| + | I have striked through the entry URL which is used to SSO into the organization. | ||
| + | |||
| + | The URL looks like | ||
| + | < | ||
| + | https:// | ||
| + | </ | ||
| + | where you can pick the " | ||
| + | |||
| + | |||
| + | === SSO from a CMD / Shell === | ||
| + | |||
| + | When the setup is done \\ | ||
| + | then trigger login from console \\ | ||
| + | will allow you to get credentials **for the console** via SSO \\ | ||
| + | or for the programmatic access | ||
| + | |||
| + | SSO from the command line like this: | ||
| + | < | ||
| + | $ aws sso login --profile default | ||
| + | |||
| + | Attempting to automatically open the SSO authorization page in your default browser. | ||
| + | If the browser does not open or you wish to use a different device to authorize this request, open the following URL: | ||
| + | |||
| + | https:// | ||
| + | |||
| + | Then enter the code: | ||
| + | |||
| + | ABCD-CPZB | ||
| + | </ | ||
| + | |||
| + | After the login with your global user (which you manage in your IAM identity center https:// | ||
| + | you will be redirected to the SSO page | ||
| + | |||
| + | {{https:// | ||
| + | |||
| + | From where you can approve the request: | ||
| + | |||
| + | {{https:// | ||
| + | |||
| + | Dont forget to log out: | ||
| + | |||
| + | < | ||
| + | $ aws sso logout | ||
| + | </ | ||
| + | |||
| + | |||
| + | === SSO to AWS management console === | ||
| + | |||
| + | To SSO into the AWS console - your also can navigate directly to \\ | ||
| + | and pick one of the available role to SSO into the AWS management console. | ||
| + | |||
| + | {{https:// | ||
| + | |||
| + | |||
| + | |||
| + | ==== Setting up SSO via " | ||
| + | |||
| + | As in https:// | ||
| + | |||
| + | |||
| + | To make the terraform work - you need a profile without " | ||
| + | |||
| + | as stated in https:// | ||
| + | |||
| + | |||
| + | |||
| + | **Leave "SSO session name" empty!!** | ||
| + | |||
| + | < | ||
| + | $ aws configure sso --profile default | ||
| + | |||
| + | SSO session name (Recommended): | ||
| + | WARNING: Configuring using legacy format (e.g. without an SSO session). | ||
| + | Consider re-running " | ||
| + | |||
| + | SSO start URL [None]: https:// | ||
| + | SSO region [None]: eu-central-1 | ||
| + | Attempting to automatically open the SSO authorization page in your default browser. | ||
| + | If the browser does not open or you wish to use a different device to authorize this request, open the following URL: | ||
| + | |||
| + | https:// | ||
| + | |||
| + | Then enter the code: | ||
| + | |||
| + | XXXX-XXXX | ||
| + | |||
| + | <select role> | ||
| + | Using the role name " | ||
| + | CLI default client Region [None]: <default region> | ||
| + | CLI default output format [None]: <default output> | ||
| + | |||
| + | To use this profile, specify the profile name using --profile, as shown: | ||
| + | |||
| + | aws s3 ls --profile default | ||
| + | |||
| + | </ | ||
| + | |||
| + | |||
| + | |||
| + | |||
| + | Associated | ||
| + | |||
| + | ~/ | ||
| + | |||
| + | < | ||
| + | [default] | ||
| + | region = eu-central-1 | ||
| + | sso_start_url = https:// | ||
| + | sso_region = eu-central-1 | ||
| + | sso_account_id = 36********63 | ||
| + | output = json | ||
| + | sso_role_name = Admin-NoIAM-NoBilling | ||
| + | |||
| + | </ | ||
| + | |||
| + | |||
| + | == Provisioning the permission sets == | ||
| + | |||
| + | Newly defined permission sets remain in the "not provisioned" | ||
| + | |||
| + | {{https:// | ||
| + | |||
| + | |||
| + | To become available anywhere - they must be explicitly assigned to an account. | ||
| + | |||
| + | {{https:// | ||
| + | |||
| + | {{https:// | ||
| + | |||
| + | {{https:// | ||
| + | |||
| + | Only then the permission sets become " | ||
| + | |||
| + | {{https:// | ||
