Skip to content

Mix of 'IAM' and 'IAM Identity Center' users leads to strange behavior

0

Hi, Some time ago I created 2 IAM users for my private AWS account using IAM Identity Center and it was working until today, when I was still able to log on AWS console using them. Later, I decided to check the old 'IAM' service, to compare user management with IAM Identity Center. 'IAM Identity Center' users were not visible in 'IAM', so I created a new one (with a different name) in 'IAM'. It was successful, and I could log on to AWS console with it, but unfortunately my old 'IAM Identity Center' users became revoked. In the first moment I thought that I forgot passwords, so I reset them from my root account. I got resetting email, but when I tried to set the password to the one I thought I forgot, the password resetting mechanism rejected it, claiming sth. is wrong with it (it met all the security standards about number and types of characters). I concluded that the password was still kept somewhere in AWS and that's why I couldn't change to it, because it was the one that was used before, so I picked a completely new one. This time password resetting worked, and I was redirected to AWS service portal. Unfortunately, I still can't log in with this IAM user on AWS console.

To sum up:

  • I have a working IAM user created with old 'IAM' service, with which I can log on AWS console
  • I have two IAM users created win 'IAM Identity Center' service, with which I can't log on AWS console (though I could before), but still can access AWS service portal.

How can I restore access to these two users, without deleting and recreating them?

5 Answers
1

Login with An administrator user, go to IDC (IAM Identity Center) and reset the users passwords

EXPERT
answered 10 months ago
EXPERT
reviewed 10 months ago
  • As I explained, I did that, but that didn't help.

  • As Per Leos Answer. Its different URL to login with IAM and Identity Centre. Goto IDC and get the URL to login via IDC

1

If you're using the built-in user directory of IAM Identity Center (IDC), those users cannot and never were able to log on to the standard logon page of the AWS Management Console. Instead, IDC users log on via the IDC logon portal, which they would normally access via a URL of the form https://[directory_alias].awsapps.com/start where "directory_alias" would be the alias name you chose for your environment when provisioning IDC.

It's possible that you might have had similarly named users both in IDC and some AWS account in the standard IAM service, but that's just coincidental. The users in IDC's user directory are completely unrelated to IAM users you see and can configure in the standard IAM service console. Users you create in IDC's user directory will not appear in the users view of the IAM service, and users created in IAM will not appear in IDC's user directory. By the same token, if you reset the password for a user in IDC's directory, it will not affect a similarly named IAM user, or vice versa.

EXPERT
answered 10 months ago
EXPERT
reviewed 10 months ago
1

*If you're using the built-in user directory of IAM Identity Center (IDC), those users cannot and never were able to log on to the standard logon page of the AWS Management Console. *

Ok, so only now I learned that there is a difference between an 'IAM user' and 'IDC user'. The fact the IAM Identity Center is the recommended tool for handling users, yet IDC users can't log on from aws.amazon.com, while IAM users can, is quite confusing. At first sight, IDC users seem kind of 'inferior' with respect to IAM users. For example, I can activate 'IAM access' so that IAM users can access billing information an create billable stuff. How can grant similar access to an IDC user, so that it can create stuff?

where "directory_alias" would be the alias name you chose for your environment when provisioning IDC.

Can I change this "directory_alias" to any name after IDC is created?

answered 10 months ago
1

To Answer your 2nd question

Goto Identity Centre-> Settings-> Under Identity source, Select Actions, Customise URL

Here you can create your own name.

EXPERT
answered 10 months ago
0

You're running into a common point of confusion between IAM and IAM Identity Center (formerly AWS SSO)—they manage access in completely different ways, and the users between them are not interchangeable.

Here's what's likely happening: IAM Identity Center users do not show up under the traditional IAM dashboard, and vice versa.

When you created an IAM user (under the IAM service), it didn't impact the IAM Identity Center directly, but attempts to log in via the AWS Console may be clashing, especially if the login portal defaults to IAM instead of Identity Center.

Password resets for IAM Identity Center users often happen via the user portal link (which looks like https://your-aws-start-url.awsapps.com/start). If you're resetting through the root account or IAM dashboard, that may not apply to Identity Center users.

What you can do: Step 1: Double-check your IAM Identity Center user portal URL. You should log in through this link, not the standard IAM sign-in.

Step 2: Go to AWS IAM Identity Center > Users, confirm the users are still active and assigned to permission sets.

Step 3: Try logging in using the start URL tied to IAM Identity Center. If successful, access should be restored.

Step 4: If login still fails, try unassigning and reassigning permission sets to those users. This often forces a refresh of credentials and login capability.

Let me know how it goes—happy to help troubleshoot further.

answered 5 months ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.