Permission Error while deploying CloudFormation Stack with Amazon Verified Permissions

0

Hello together. 5 days ago aws released a quick-start tutorial for Amazon Verified Permissions(AVP) on Youtube. I want to use AVP with my Cognito Instance and API Gateway. At Minute 07:25 we have to deploy a CloudFormation Stack. This stack runs on an error. I have tried it several times. The creation of LambaServiceRole seams to be the root cause (or the first) which ends with the status "CREATION_FAILED". I got this information from the "Events" tab in the created stack. The status reason is the following:

Resource handler returned message: "The security token included in the request is invalid (Service: Iam, Status Code: 403, Request ID: 336205ef-2de2-482f-aded-7c6fb5db05b9)" (RequestToken: 1f125552-3390-2f9a-72c7-31acc77a2387, HandlerErrorCode: AccessDenied)

I do not have any ideas how to solve this issue. I´m working with the root user. So there shouldn´t be any permission restrictions on that user. I appreciate every help. Thank you very much.

Best whishes Philipp

2개 답변
0

Hi,

I just tested it, the cloudformation seems to work correctly in my case. Since you are using the root user, the only plausible explanation would be the issue is being caused by higher level restrictions i.e. imposed by an AWS Organizations service control policy (SCP) that affects your AWS account. In this case, you would need to review and update the SCP to grant the necessary permissions.

If it is not SCP related, I would suggest you to approach AWS support, since this issue could be specific to your account.

Thanks, Rama

profile pictureAWS
Rama
답변함 한 달 전
profile picture
전문가
검토됨 한 달 전
  • Hi Rama. Thank you for the testing of my problem. Good to know, that the steps in the tutorial works fine. My AWS account doesn´t belong to an AWS organization. So there are no SCPs present. I will ask my question to AWS support. If anyone still has a hint, I would be very grateful. Thanks, Philipp

0

I've had the same issue with getting 403s on creating the AVPAuthorizerLambdaServiceRole when following the same steps in the tutorial. We're using a user with Administrator Access.

In our case, it doesn't seem to be associating an IAM role with the created stack, so it fails on deployment.

I'm not sure why it's not setting it, but I was able to create the AVPAuthorizer in CloudFormation manually by doing the following:

  • Downloading the template for the failed AVPAuthorizer in CF
  • Creating a new stack using this template
  • Setting the correct IAM role on the Permissions section (Step 3)

This creates the AVP Authorizer for us but we want to have it create via the AVP Cognito / API Gateway setup options.

ChiaC
답변함 한 달 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인