Permission & Configuration Structure #58
-
Context / Environment Status:
The AWS Identity Center has been configured with Okta SSO in the
The account map is as follows:
We have found that It seems to me that: Since we use Questions: Additionally we see some costs in across all of our accounts that come up as |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments
-
Yes this sounds correct. We use the It's important to create the account-level boundary between However AWS Identity Center creates an additional path to access accounts of the organization. With Identity Center Permission Sets, developers can assume access in a specific account directly. You might want to use a Permission Set to quickly access an account in the AWS web console or to assume a specific account locally. But you need to assume an AWS Team in Please see this page for more on this design: https://docs.cloudposse.com/layers/identity/centralized-terraform-access/ |
Beta Was this translation helpful? Give feedback.
-
Budgets are centralized in the root ( |
Beta Was this translation helpful? Give feedback.
-
To resolve this discrepancy we needed to change:
However since we have an actual
Now with our |
Beta Was this translation helpful? Give feedback.
/stacks/catalog/accounts.yaml
neededterraform.account.vars.organization_config.root_account.name
to becore-root
when in reality we usecorp1
.To resolve this discrepancy we needed to change:
/stacks/catalog/account-map.yaml
to haveterraform.account-map.vars.root_account_aws_name: corp1
terraform.account-map.vars.root_account_name: core-root
However since we have an actual
core-root
account in thecore OU
this becomes a conflict. To resolve this issue:core-root
account from the aws orgpost-closure
period which assigns it theSUSPENDED
state & becomes ignored by the TF plan resolving the issue.