AWS SSO VPN accessing VPC in another Account

0

Hi there,

I have 2 AWS Accounts:

  • Management (with SSO Enabled)
  • Dev (with EKS)

I've created a Client VPN Endpoint application in Management (SSO).

I have few users in SSO (Management) that need to access an EKS Cluster in Dev account.

My Client VPN needs to associate with private subnets in another account.

I see 2 possible solutions:

  • create a new VPC in Management and peer with EKS VPC (Dev)
  • create a VPN in Dev using mutual authentication

Does anyone have another option?

Or tell me which of the two could be the best.

已提問 4 個月前檢視次數 293 次
2 個答案
1
已接受的答案

You should keep your management account as empty as possible.

I would deploy a central AWS Network account and VPN into there and then either use transit gateway or VPC peering to dev.

profile picture
專家
已回答 4 個月前
  • Agree, but in this case I'm not able to use VPN on SSO, right?

  • No that’s not correct. You can still have SSO on the VPN

  • In the network account in IAM you setup an IDP pointing to your SSO and then the vpn client is configured to use the IDP in iam and it all works. I’ve set this up before with azure AD SSO. What’s your SSO provider?

0

Hi Gary,

Sorry for late and thanks for helping!

I'm using AWS SSO.

I've created a Networking Account and Shared the Private Subnets with MGMT Account via RAM.

Now I'm using the VPN in MGMT account (with SSO) accessing the EKS Cluster (private).

已回答 4 個月前
  • I'll try to follow your recommendation and move the VPN to the Networking Account and setup an IDP in this account authenticating with the MGMT SSO.

  • No worries you should keep your management account as empty as possible and use workload accounts for things such as eks and network account for networking stuff. It follows AWS SRA. Transit gateway is great for your use case but does cost to run it. Any questions please just shout.

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南