How to use IAM users, groups and roles with SSO
My organization has no AD nor any IdP that can be used to link AWS SSO to. I see that the SSO identity store has no cf/cli/api feature to manage users.
Is there a way to use IAM users, goups and roles in the root account to log into the other organization accounts?
If so, how to?
You can log into the member accounts from the root account by Switch Role. Of course, you need to attach proper permission to the IAM users, goups and roles in the root account.
If Organizations not Control Tower, the role "OrganizationAccountAccessRole" in default is assigned to the member accounts. If Control Tower, "AWSControlTowerExecution" is assigned.
In this use case, the root account is often called as jump account. However, for example In production, It is better to use another account not the root account as jump account for separating permissions from the root account.
Manage identities in AWS SSO - how to create Users via CLI or API ?asked 7 months ago
ELI5: AWS CLI and SSOasked 7 months ago
AWS SSO user with AdministratorAccess cannot access root owned resourcesasked 4 months ago
How to use EKS with AWS SSOasked 10 months ago
AWS Service Catalog. Grant SSO Users to the Portfolioasked 2 months ago
AWS SSO - Manage UsersAccepted Answerasked a month ago
How to use IAM users, groups and roles with SSOasked a month ago
AWS SSO and multiple regionsasked 4 months ago
Problem with SSOasked 2 months ago
S3 + SSO permission to list a predefined list of buckets.asked 6 days ago