assignment failure of the same permission set in identity center

0

Hi I created an organization with two accounts and a single user in the identity center for sso access
Then I created a single permission set with customized statements in an inline policy.
In iam identity center dashboard I'm trying to assign the same permission set to both the accounts in my organization: but when I assign to the second account the same sso user (in the step1) and the same permission set in the second step I got

0 of 1 assignments configured successfully. Your users can access the AWS Account with the permissions you assigned. 1 of 1 failed to be configured. You can retry submitting them, or you can leave the page and the failed assignments won’t be submitted.

Is this scenario expected? In the manual I read

You can create a single permission set and assign it to multiple AWS accounts within your organization. You can also assign multiple permission sets to the same user.

Is a provisioning issue? Do I need to wait for the permission propagation? Should I erase the second account and retry? If I try to login in the sso access portal I can only see the first account of my organization.. Should I create a different permission set with the same rules? but why?

gefragt vor 4 Monaten205 Aufrufe
1 Antwort
1

Not sure what happened, I just retried the same procedure and all worked fine. I could add the same permission set to both accounts without problem.

beantwortet vor 4 Monaten

Du bist nicht angemeldet. Anmelden um eine Antwort zu veröffentlichen.

Eine gute Antwort beantwortet die Frage klar, gibt konstruktives Feedback und fördert die berufliche Weiterentwicklung des Fragenstellers.

Richtlinien für die Beantwortung von Fragen