Delegated Administrative Policy error to add CreateOrganisationalUnit

0

I have created a Delegation Policy and assign it to an account so that I can login as the user in that account to perform Adminstrative tasks just like root.

Unfortunately, I am not able to create OU when I login as the user assigned as the delegated administrator.

When I review the Policy for the Delegated Administrator, there is no permission for CreateOrganisationalUnit. Below is the Policy for the Delegated Administrator.

After I added "organizations:CreateOrganizationalUnit" to the policy below and clicked Save Policy, I get an error: Failed to edit delegation policy. API Response: This resource-based policy contains an unsupported action.

  1. How do I fix the error above?
  2. Is there a way I can create an administrator user to inherit permissions from root without having to assign individual permissions?
  3. Can I assign the managed permission set such as billing, AdministratorAccess etc to the Delegated administrative Policy?
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "DelegatingNecessaryDescribeListActions",
      "Effect": "Allow",
      "Principal": {
        "AWS": "arn:aws:iam::111111111117:root"
      },
      "Action": [
        "organizations:DescribeOrganization",
        "organizations:DescribeOrganizationalUnit",
        "organizations:DescribeAccount",
        "organizations:DescribePolicy",
        "organizations:DescribeEffectivePolicy",
        "organizations:ListRoots",
        "organizations:ListOrganizationalUnitsForParent",
        "organizations:ListParents",
        "organizations:ListChildren",
        "organizations:ListAccounts",
        "organizations:ListAccountsForParent",
        "organizations:ListPolicies",
        "organizations:ListPoliciesForTarget",
        "organizations:ListTargetsForPolicy",
        "organizations:ListTagsForResource"
      ],
      "Resource": "*"
    }
  ]
}
2回答
0
承認された回答

Be aware of the following:

-The CreateOrganizationalUnit permission needs to be explicitly added to the policy for the delegated administrator role. -AWS Organizations does not support resource-based policies for delegated administrators. The policy must use the supported action-based format. -As a best practice, consider creating an IAM group with the required administrator permissions, then assigning the group to the delegated user instead of individual permissions.

To create an administrator group: -Open the IAM console and create a new group called "Administrators" -Attach the managed policy "AdministratorAccess" to grant full administrative permissions -Add users to the group to inherit the permissions

profile picture
エキスパート
回答済み 3ヶ月前
0

https://docs.aws.amazon.com/organizations/latest/userguide/orgs_integrate_delegated_admin.html

By registering a member account as a delegated administrator for an AWS service you enable that account to have some administrative permissions for that service, as well as permissions for Organizations read-only actions.

The best way to avoid using root user is to create a user and assign it to the Management account, then assign permission set AdministratorAccess to the user using Identity Center.

The purpose of Delegated Administrator is mainly to manage all of the organization's accounts used in the service and reduce the use of management account.

profile picture
Lottie
回答済み 3ヶ月前

ログインしていません。 ログイン 回答を投稿する。

優れた回答とは、質問に明確に答え、建設的なフィードバックを提供し、質問者の専門分野におけるスキルの向上を促すものです。

質問に答えるためのガイドライン

関連するコンテンツ