Permission & Configuration Structure #58
-
|
Context / Environment Status: The AWS Identity Center has been configured with Okta SSO in the
The account map is as follows: We have found that It seems to me that: Since we use Questions: Additionally we see some costs in across all of our accounts that come up as |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments
-
Yes this sounds correct. We use the It's important to create the account-level boundary between However AWS Identity Center creates an additional path to access accounts of the organization. With Identity Center Permission Sets, developers can assume access in a specific account directly. You might want to use a Permission Set to quickly access an account in the AWS web console or to assume a specific account locally. But you need to assume an AWS Team in Please see this page for more on this design: https://docs.cloudposse.com/layers/identity/centralized-terraform-access/ |
Beta Was this translation helpful? Give feedback.
-
Budgets are centralized in the root ( |
Beta Was this translation helpful? Give feedback.
-
|
To resolve this discrepancy we needed to change:
However since we have an actual
Now with our |
Beta Was this translation helpful? Give feedback.
/stacks/catalog/accounts.yamlneededterraform.account.vars.organization_config.root_account.nameto becore-rootwhen in reality we usecorp1.To resolve this discrepancy we needed to change:
/stacks/catalog/account-map.yamlto haveterraform.account-map.vars.root_account_aws_name: corp1terraform.account-map.vars.root_account_name: core-rootHowever since we have an actual
core-rootaccount in thecore OUthis becomes a conflict. To resolve this issue:core-rootaccount from the aws orgpost-closureperiod which assigns it theSUSPENDEDstate & becomes ignored by the TF plan resolving the issue.