What is the most logical way to implement multi-role AD/SSO in a multi-account Organization

0

My company is trying to implement SSO through IAM Identity Center in our multi-account AWS Organization. For context, we used the AWS Landing Zone accelerator to set up our environment and added several workload accounts to their own OU. Our company also uses Azure AD, and I can edit groups.

For each workload account (there are currently 10 and will be more), we want to have both dev and admin roles per account for users to live in. With this in mind, I thought of 2 options for AD/SSO integration:

OPTION 1: Creating a user group for every role and account, meaning that there would be a dev and admin user group for every workload account. The drawback to this approach is the higher number of user groups to manage, but we could utilize AWS managed policies.

OPTION 2: Using AD attributes (ABAC) to create custom permission sets that define a user as dev/admin, so that there only needs to be 1 user group per workload account, and dev/admin roles are determined through ABAC. The drawback to this approach is the initial set up of custom policies, but it results in less AD user groups to manage.

Which option would you go with, or are there other/better alternatives?

Ashley
질문됨 일 년 전316회 조회
1개 답변
0

Hi, another option to reduce definition burden is to use permission sets that you define once and distribute to all accounts: see https://docs.aws.amazon.com/singlesignon/latest/userguide/permissionsetsconcept.html

In all cases, I would strongly suggest to read https://aws.amazon.com/blogs/security/build-a-strong-identity-foundation-that-uses-your-existing-on-premises-active-directory/

It is most detailed practical (based on use cases) information that I personally know re. Identity Center

profile pictureAWS
전문가
답변함 일 년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠