AWS Identity Center - MFA token

1

Hi, I've an AWS organisation account setup with Identity Center enabled in the management account. I've enabled MFA sign-in for a test user. I've applied an SCP to one of the member account to deny certain operations.

 Statement:
      - Sid: DenyAllExceptListedActionsIfNoMFA
        -----
        Condition:
          BoolIfExists:
            aws:MultiFactorAuthPresent: 'false'

Now when I sign in as the test user to the member account these operations are denied for me irrespective of whether I used MFA to sign-in or not. Would you be able to give an example of how this is supposed to work on console as well as on command line? How do I pass the token? Thanks.

SS
질문됨 일 년 전546회 조회
2개 답변
1
수락된 답변

As far as I know, currently, you cannot pass MFA status from the Identity Center requirement to the 'Permission Set' created in an account from the IAM IC Service. You will need to require MFA on our IAM IC Users and assume that access to the account was provided only because the user could log in and access the account through Identity Center. The users in IC are not users presented to your member account(s). The access is granted through an assumed Role. This is something the SSO/IC team had been working on but I do not think is released yet. Long and short, that Bool Condition will only work on individual IAM users on a per member account basis.

profile picture
답변함 일 년 전
profile picture
전문가
검토됨 10달 전
1

Hi,

By default, all requests are implicitly denied with the exception of the AWS account root user, which has full access.

Can you try to create an Allow policy with aws:MultiFactorAuthPresent: 'true'

Best regards,
Ricardo Makino

profile pictureAWS
답변함 일 년 전
profile picture
전문가
검토됨 10달 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠