Cross Account S3/Athena Access in IAM Identity Center

0

Earlier we were using IAM Roles and mapped those Roles to the target AWS account since we know the NAMES of the roles we could hardcode them in IAM/s3 policy documents to manage access. with IAM Permissionset inplace , we are confused as to how to easily manage the same access to our platform users. the Names are very Weird and ends with some weird number and characters.

how should we manage the cross account resource and use these new roles created by permissionset ? Thanks

2개 답변
0
수락된 답변

You would do same as you did with IAM role names. The Permission Set names are 'weird' because they are trying to ensure they are unique and won't conflict with anything you have created. The names don't change once created, so you can use them the same way you use IAM Roles.

Hope this helps,

profile picture
답변함 일 년 전
0

Take a look at using principal and resource tagging in policy conditions. Examples

profile pictureAWS
전문가
kentrad
답변함 일 년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠