# Enable AWS IAM Identity Center (AWS SSO)
Set up centralized user access across all accounts:
Enable IAM Identity Center (must be done via Console):
- Go to IAM Identity Center in AWS Console
- Click "Enable"
- Choose "Enable with AWS Organizations"
Create Permission Sets:
Via AWS Console:
- Go to IAM Identity Center → Permission sets
- Create the following permission sets:
Administrator Access:
- Use predefined
AdministratorAccesspolicy - Session duration: 4 hours
- Require MFA
Developer Access:
- Use predefined
PowerUserAccesspolicy - Session duration: 8 hours
- Require MFA
ReadOnly Access:
- Use predefined
ViewOnlyAccesspolicy - Session duration: 12 hours
Assign Users to Accounts:
- Go to IAM Identity Center → AWS accounts
- Select an account
- Assign users or groups
- Select permission set
Example Assignment:
- Management Account: Only administrators with ReadOnly
- Development Account: Developers and administrators with full access
- Staging Account: Developers with ReadOnly, administrators with full access
- Production Account: Everyone with ReadOnly, administrators can elevate if needed
- Security Account: Security team with full access, administrators with ReadOnly
- Shared Services Account: DevOps team with full access
# Set Up Cross-Account Access
The OrganizationAccountAccessRole was automatically created when you created each account. This role allows administrators in the Management account to assume roles in member accounts.
Assume Role to Access Member Account:
# Get credentials for a member account
aws sts assume-role \
--role-arn arn:aws:iam::111111111111:role/OrganizationAccountAccessRole \
--role-session-name admin-session
# Or configure AWS CLI profile - ~/.aws/confi
[profile dev-admin]
role_arn = arn:aws:iam::111111111111:role/OrganizationAccountAccessRole
source_profile = default
region = us-east-2
[profile prod-admin]
role_arn = arn:aws:iam::222222222222:role/OrganizationAccountAccessRole
source_profile = default
region = us-east-2
# Use the profile
aws sts get-caller-identity --profile dev-admin
What We Accomplished:
✅ IAM Identity Center (SSO) enabled for centralized access management
✅ Cross-account access configured with OrganizationAccountAccessRole