- 最新
- 最多得票
- 最多評論
I am not exactly sure what is your requirement.
-
We have option to delegate administration of users in a registered member account e.g. aws2 to perform most IAM Identity Center (previously called SSO) administrative tasks. Please see doc at https://docs.aws.amazon.com/singlesignon/latest/userguide/delegated-admin.html
-
Do you also want to allow member account to administer their own users and group? If this is the requirement, they can continue to do that in their respective aws account using IAM.
Based on your background description, I think AWS control tower service will be beneficial to your multi-account management, please refer to the relevant service introduction. https://docs.aws.amazon.com/controltower/latest/userguide/what-is-control-tower.html At the same time, AWS proserver team can provide the solution deployment, then help Customer quickly build the environment.
相關內容
- 已提問 8 天前
- AWS 官方已更新 3 年前
- AWS 官方已更新 1 年前
- AWS 官方已更新 4 個月前
as per your answer I understand that aws1 is the delegated administrator account in my case. So my question is how can i manage permissions for different users across different account from one account. Currently AWS organization is setup in aws1 and also SSO is enabled in aws1. For giving permissions to any users we have to login to aws1.
For your case, aws1 will be the delegated administrator account, this will be used to manage access to all other aws accounts that is part of the AWS organization. Do you want more aws accounts to be used instead of just aws1?
For your case, aws1 will be the management account, this is used to manage access to all other aws accounts that is part of the AWS organization. You can also delegate another aws account e.g. aws2