- Newest
- Most votes
- Most comments
Based on the error message you're seeing, it appears you're encountering an account verification issue with AWS CloudShell. This is not directly related to IAM roles or permissions, but rather to the status of your AWS account.
The error message "Unable to start the environment. You must verify your account before accessing CloudShell. To verify your account, contact AWS Support" indicates that there's a requirement for account verification before you can use CloudShell.
This issue cannot be resolved by adding yourself to an IAM role or adjusting CloudShell permissions. It's an account-level concern that requires intervention from AWS Support.
To resolve this, you need to contact AWS Support directly. Even if you're using the free tier, you can open a case with AWS Support for free under the "Account and billing" category. This is the appropriate channel to address account verification issues.
Regarding your concern about deleting CloudShell and potentially losing EC2 and S3 bucket instances - you don't need to worry about this. CloudShell is a separate service and deleting or having issues with CloudShell will not affect your EC2 instances or S3 buckets. These services operate independently of CloudShell.
To proceed, you should open a support case with AWS to verify your account. Once your account is verified, you should be able to use CloudShell without this error.
Sources
I cat't use cloudshell | AWS re:Post
Unable to start CloudShell must verify account.Contact AWS Support | AWS re:Post
It looks like you’re facing an IAM permission issue when trying to use AWS CloudShell. Even if you’ve added yourself to an IAM role, CloudShell requires specific permissions to work properly.
Steps to Fix:
1.Check IAM Policies: Ensure your IAM role has the necessary policies attached, such as AWSCloudShellFullAccess. You can check this in the IAM Console--> Roles--> [Your Role]-->Permissions.
2.Verify Service Control Policies (SCPs): If you’re in an AWS Organization, SCPs might be blocking CloudShell access.
3.Look at AWS Config & Guardrails: Some AWS Config rules or Organizational Service Control Policies might be restricting CloudShell use.
4.Try Another Region: Some AWS services behave differently across regions. If possible, test CloudShell in a different region.
Regarding Deletion:
No, deleting CloudShell will NOT affect your EC2 instances or S3 buckets. CloudShell is a separate service and does not directly interact with running instances or storage.
However, any temporary files stored in the CloudShell environment will be lost.
If it still doesn’t work, try running this AWS CLI command to check your current permissions:
aws sts get-caller-identity
This will confirm the active IAM role and its permissions.
Relevant content
- asked 6 months ago
- asked 4 years ago
