Skip to content

Why can't I access my member account in AWS Organizations?

3 minute read
0

I want to access my member account in an AWS Organization.

Resolution

To gain access to a member account in your organization, first try signing in with the email address and password that you created for the account.

If you can't sign in with your initial password, complete the following steps:

  1. Open the AWS Management Console.
    Note: If you're already signed in to AWS, then you must sign out to see the Sign in page.
  2. Choose Root user.
  3. Enter the email address that is associated with your AWS account, and then choose Next.
  4. Choose Forgot your password? Then, enter the information that's required to reset the password. Confirm that your email address that's associated with the account is active and receives incoming email.

Access a member account that has a management account access role

When you create a member account, AWS Organizations automatically creates an AWS Identity and Access Management (IAM) role called OrganizationAccountAccessRole in the account. This role has full administrative permissions in the member account. The scope of access for this role includes all principals in the management account.

To assume the OrganizationAccountAccessRole, complete the following steps:

  1. Open the AWS Management Console with IAM user credentials that grant administrator permissions in the management account.
  2. Grant permissions to members of the IAM group in the management account to access the role.
  3. Switch to the role for the member account.

Use the AWS CLI to switch the IAM role programmatically

Note: If you receive errors when you run AWS Command Line Interface (AWS CLI) commands, then see Troubleshooting errors for the AWS CLI. Also, confirm that you're using the most recent AWS CLI version.

You can't switch roles when you sign in as the AWS account root user. For more information, see Granting a user permissions to switch roles.

To switch the IAM role programmatically, run the following assume-role AWS CLI command:

aws sts assume-role \
  --role-arn arn:aws:iam::MEMBER-ACCOUNT-ID:role/OrganizationAccountAccessRole \
  --role-session-name my-session

Note: Replace MEMBER-ACCOUNT-ID with your member account ID.

Create the OrganizationAccountAccessRole in an invited member account

Invited member accounts that join your organization don't automatically get an administrator's role. You must create the role manually. This action duplicates the role automatically set up for created accounts. As a best practice, use the same name, OrganizationAccountAccessRole, for your manually created roles for consistency and ease of use.

Post-closure

If you closed a member account more than 90 days previously, then the account is permanently closed and you no longer have access to it. All content and AWS services associated with this account are deleted.

Related information

When should I use an external ID?

AWS Multi-factor authentication in IAM

Close an AWS account

2 Comments
  1. Log in to the AWS Management Console with either as IAM user of the management account or with a delegated administrator’s credentials.
  2. Go to the AWS IAM console.
  3. Select “Root Access Management”
  4. Choose the member account where root user credentials need to be recovered.
  5. Click the “Take privileged action” button for the selected account.
  6. Select the “Allow password recovery” option. If “Allow password recovery" is not available, then click “Delete root user credentials”
  7. Repeat steps 3 to 6.
  8. Follow the on-screen instructions to confirm the action and initiate the password recovery process for the member account’s root user.
AWS
replied 9 months ago

This article was reviewed and updated on 2026-02-24.

AWS
MODERATOR
replied 4 days ago