Ao usar o AWS re:Post, você concorda com os AWS re:Post Termos de uso

IAM Identity Center created user: "You have no applications"

0

Hello,

I have started configuring users via AWS Identity Center and I have created an Identity Center group with restricted permissions where I only have attached the AWS managed "CloudWatchLogsReadOnlyAccess " policy. When I try to log into the console I get "you have no applications". Below it seems like the permission set is "Not provisioned", what crucial step have I overlooked and what's the right process for creating groups and permission sets for Identity Center for console users? I have followed https://docs.aws.amazon.com/singlesignon/latest/userguide/useraccess.html

Thanks in advance,

IAM Identity Center Permission sets: cloudwatch-readonly-sso-test

Permission set name cloudwatch-readonly-sso-test

Created date February 02, 2024, 16:32 (UTC) Provisioned status: Not provisioned

Policy name Type Description CloudWatchLogsReadOnlyAccess AWS managed Provides read only access to CloudWatch Logs

feita há 10 meses647 visualizações
1 Resposta
0

Hi Ohuk2, A permission set not provisioned refers to a permission set that has been created in AWS Identity Center, but not yet associated or applied to any target (such as an AWS account, OU, or user). After you created a Permission Set, and you have attached to it some permission, you need to define which IAM Identity Center Users or Groups can access which Accounts within your Organization with that permissions.

To do so, you should start from "AWS Accounts" under "Multi-account permissions" of the IAM Identity Center menu. Here you have to select the Account(s) where you want to grant the permissions to, then the User(s) or Group(s) you want to give that permissions, and finally the permission set(s) you want to use to assign the intended rights.

Last, but not least: The user and group assignment process might take a few minutes to complete, you have to leave the page open until the process successfully completes.

This create a relationship between Account-User/Group-Permission Set.

After this is done, the User should be able to login to the AWS access portal URL and, once authenticated, see the accounts where he/she can actually work, with the Permission Set(s) you specified.

Did you follow these steps and still the Permission Set is shown as Not Provisioned ?

What Identity Source are you using ? The IAM Identity Center Directory or an External federated IDP ?

profile pictureAWS
respondido há 10 meses
profile picture
ESPECIALISTA
avaliado há 8 meses

Você não está conectado. Fazer login para postar uma resposta.

Uma boa resposta responde claramente à pergunta, dá feedback construtivo e incentiva o crescimento profissional de quem perguntou.

Diretrizes para responder a perguntas