Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution, your identity and access management teams can extend AWS SSO functionality by automating common access management and governance use cases

License

NotificationsYou must be signed in to change notification settings

aws-samples/aws-iam-identity-center-extensions

Repository files navigation

Table of Contents

Overview

High level design

AWS IAM Identity Center Extensions for Enterprise simplifies the process to manage useraccess to AWS accounts withAWS IAM Identity Center by extending theAWS IAM Identity Center API.

Instead of separately managingAWS IAM Identity Center permission sets and accountassignments, you can use this solution to describe permission sets with one API callper set. Like with permission sets, you can also define andimplement account assignments at a global level, an organizational unit level or an account taglevel. The solution ensures your defined permissions are rolled out acrossthe entire AWS Organization, and that they are updated as you change yourorganization.

This solution can be used by your identity and access management team to simplify useraccess provisioning at scale, either via a RESTFul API or by defining andsetting objects with your permissions descriptions in an S3 bucket. Thisenables you to integrate with upstream identity management systems youhave in your organization.

Get started with the deployment!

Features

The Composite Permission Set API

This solution provides a composite API for managing permission set lifecycles, allowing you to:

  • Create a permission set object including attributes and policies in a single call
  • Update parts or all of a permission set object in a single call with a friendly name
  • Delete a complete permission set in a single call with a friendly name
  • Based on a configuration parameter, use either an S3 based interface or a RESTful API to upload permission set object as a whole
  • Enforce the "cannot delete" constraint when a permission set is being referenced in an account assignment
Example payload tocreate a permission set

{"action":"create","permissionSetData": {"permissionSetName":"CloudOperator-ps","sessionDurationInMinutes":"240","relayState":"https://{{region}}.console.aws.amazon.com/console/home?region={{region}}#","tags": [      {"Key":"versionid","Value":"01"      },      {"Key":"team","Value":"CloudOperators"      }    ],"managedPoliciesArnList": ["arn:aws:iam::aws:policy/job-function/SystemAdministrator","arn:aws:iam::aws:policy/job-function/NetworkAdministrator"    ],"inlinePolicyDocument": {"Version":"2012-10-17","Statement": [        {"Action": ["iam:AddRoleToInstanceProfile","iam:CreateInstanceProfile","iam:CreatePolicy","iam:CreatePolicyVersion","iam:DeleteInstanceProfile","iam:DeletePolicy","iam:DeleteRole","iam:PassRole","iam:UpdateRole","iam:DeleteRolePermissionsBoundary","iam:UpdateRoleDescription","iam:RemoveRoleFromInstanceProfile"          ],"Resource": ["arn:aws:iam::*:role/Application_*","arn:aws:iam::*:policy/Application_*","arn:aws:iam::*:instance-profile/Application_*"          ],"Effect":"Allow","Sid":"AllowOtherIAMActions"        },        {"Action": ["iam:List*","iam:Generate*","iam:Get*","iam:Simulate*"],"Resource":"*","Effect":"Allow","Sid":"AllowReadIAMActions"        }      ]    },"customerManagedPoliciesList": [      {"Name":"cmp-1","Path":"/cmp/1/"      },      {"Name":"cmp-2","Path":"/cmp/2/"      },      {"Name":"cmp-3"      }    ],"permissionsBoundary": {"ManagedPolicyArn":"arn:aws:iam::aws:policy/job-function/NetworkAdministrator"    }  }}

Example payload toupdate a permission set

{"action":"update","permissionSetData": {"permissionSetName":"CloudOperator-ps","sessionDurationInMinutes":"420","relayState":"https://{{region}}.console.aws.amazon.com/console/home?region={{region}}#","tags": [      {"Key":"versionid","Value":"02"      },      {"Key":"team","Value":"CloudOperators"      }    ],"managedPoliciesArnList": ["arn:aws:iam::aws:policy/job-function/SystemAdministrator","arn:aws:iam::aws:policy/job-function/NetworkAdministrator","arn:aws:iam::aws:policy/AWSHealthFullAccess"    ],"inlinePolicyDocument": {"Version":"2012-10-17","Statement": [        {"Action": ["iam:List*","iam:Generate*","iam:Get*","iam:Simulate*"],"Resource":"*","Effect":"Allow","Sid":"AllowReadIAMActions"        }      ]    },"customerManagedPoliciesList": [      {"Name":"cmp-1","Path":"/cmp/1/"      },      {"Name":"cmp-2","Path":"/cmp/2/"      },      {"Name":"cmp-3"      }    ],"permissionsBoundary": {"CustomerManagedPolicyReference": {"Name":"cmp-pb","Path":"/cmp/pb/"      }    }  }}

Example payload todelete a permission set

{"action":"delete","permissionSetData": {"permissionSetName":"CloudOperator-ps"  }}

Enterprise friendly account assignment life cycle

This solution enables enterprise friendly account assignment lifecycles through the following features:

  • Using users/groups as the mechanism for the principal type
  • Friendly names for users/groups and permission sets when creating account assignments
  • Based on the configuration parameter, you can use either an S3 based interface/ Rest API interface to create/delete account assignments
  • Create & delete account assignments with scope set toaccount, root, ou_id or account_tag
  • Using the entity value passed in the payload, the solution calculates the account list and processes the account assignment operations on all the accounts automatically
  • When using anou_id scope type, the solution optionally provides nested OU support as well. This behaviour could be configured by settingSupportNestedOU totrue in your environment configuration file. When configured, the solution discovers all the children under a specified ou_id traversing the complete tree and assigning the account assignment to every single account under the tree.

NOTE: Permission sets and user/group assignments cannot be applied to the Organization Main account (also known as the Master Payer) due to a design constraint of the AWS API. There is no available mechanism to programmatically manage the permission sets and user/group assignments of the Organization Main account.

Example payload to provision permission setCloudOperator-ps forall accounts in your organization and provide access toteam-CloudOperators user group

{"action":"create","linkData":"root%all%CloudOperator-ps%team-CloudOperators%GROUP%ssofile"}

Example payload to provision permission setSecurityAuditor-ps forall accounts in your organization unit with ID ou-id12345 and provide access toteam-SecurityAuditors user group

{"action":"create","linkData":"ou_id%ou-id12345%SecurityAuditor-ps%team-SecurityAuditors%GROUP%ssofile"}

Example payload to provision permission setDataScientist-ps forall accounts that have tagkey team set to value DataScientists and provide access toteam-DataScientists user group

{"action":"create","linkData":"account_tag%team^DataScientists%DataScientist-ps%team-DataScientists%GROUP%ssofile"}

Example payload to provision permission setBilling-ps foraccount 123456789012 and provide access toteam-Accountants user group

{"action":"create","linkData":"account%123456789012%Billing-ps%team-Accountants%GROUP%ssofile"}

Example payload to provision permission setBreakglass-ps forall accounts in your organization and provide access tobreak-glass user

{"action":"create","linkData":"root%all%Breakglass-ps%break-glass%USER%ssofile"}


Automated access change management for root, ou_id and account_tag scopes

The solution provides automated change access management through the following features:

  • If an account assignment has been created through the solution with scope set to root, and if a new account has been created at a later time, this new account is automatically provisioned with the account assignment.
  • If an account assignment has been created through the solution with scope set to ou_id, and an existing account moves out of this ou, this account assignment is automatically deleted from the account by the solution. If a new account is moved in to the ou, this account assignment is automatically created for the account by the solution.
  • The solution also supports nested OU behaviour for automated access change management. This behaviour could be configured by settingSupportNestedOU totrue in your environment configuration file. If the nested OU support is configured, when an account moves from a source OU to a destination OU, the solution discovers all the parents of the source OU and destination OU until root , to determine the list of account assignments that need to be removed/added automatically.
  • If an account assignment has been created through the solution with scope set to account_tag, and an account is updated with this tag key value at a later time, this account assignment is automatically created for the new account by the solution. Additionally, when this tag key value is removed from the account/when this tag key is updated to a different value on the account at a later time, this account assignment is automatically deleted from the account by the solution.

Import existing AWS IAM Identity Center access entitlements for management through the solution

  • The solution enables a one-time import of existing AWS IAM Identity Center access entitlements for management through the solution
  • Based on theImportCurrentSSOConfiguration flag in the configuration file, the solution would import all existing permission sets and account assignments so that they could be updated/deleted through the solution interfaces
  • The solution ensures that all related attributes of permission sets/account assignments are imported in a format that would allow you to manage them through the solution interfaces
  • All account assignments would be imported asaccount scope types
  • While the solution triggers an automatic import one-time through the pipeline, once enabled theenv-importCurrentConfigSM state machine in yourAWS IAM Identity Center account andAWS IAM Identity Center region could be run as many times as you require. You could refer to the execution input that the solution uses as part of the pipeline deployment for reference.

De-couple life cycle management of different SSO objects and other features

  • The solution enables de-coupling creation of permission sets , user groups and account assignment operations completely. They could be created in any sequence, thereby enabling enterprise teams to handle these objects lifecycles through different workflow process that align to their needs, and the solution would handle the target state appropriately
  • The solution enables usage of friendly names in managing permission set, account assignment life cycles and would handle the translation of friendly names into internal AWS IAM Identity Center GUID's automatically
  • The solution enables deployment in a distributed model i.e. orgmain, deployment and target account (or) in a single account model i.e. orgmain only. It's recommended that single account model of deployment be used only for demonstration purposes
  • The solution assumes that AWS IAM Identity Center is enabled in a different account other than orgmain account and has the required cross-account permissions setup to enable the functionalities. This future-proofs the solution to support the scenario when AWS IAM Identity Center service releases delegated admin support similar to other services such as GuardDuty

Schema details for account assignment and permission set operations

  • For account assignment operations with API interface
    • action should be exactly one ofcreate, delete
    • linkData should match this format:scopetype%scopevalue%permissionsetname%principalname%principaltype%ssofile
  • For account assignment operations with S3 interface
    • file name should match this format:scopetype%scopevalue%permissionsetname%principalname%principaltype%ssofile
    • file contents are empty i.e. empty file
  • For both interface types,
    • scopetype should be exactly one ofroot, ou_id, account_tag, account
    • scopevalue sould match the keywordall if scopetype is set to root
    • scopevalue should match the organisational unit ID if scopetype is set to ou_id
    • scopevalue should matchtagkey^tagvalue convention if scopetype is set to account_tag
    • scopevalue should have account number if scopetype is set to account
    • permissionsetname should match permission set name
    • principalname should matchdisplayname if principal type is group , else it should matchusername if principal type is user
    • principaltype should be exactly one ofGROUP, USER
  • For permission set operations with API interface
    • action should be exactly one ofcreate, update, delete
  • For permission set operations with S3 interface
    • file name should match this format:permisssionsetname.json

Using API interface for your use cases

If you chose to useAPI interface for managing your permission sets and account assignments i.e. setLinksProvisioningMode orPermissionSetProvisioningMode toapi, then read below for usage instructions:

  • Refer to postman collection sample underdocs\samples\postman-collection for account assignment and permission set operation examples
  • More details on usingAPI interface are documentedhere

Using S3 interface for your use cases

If you chose to useS3 interface for managing your permission sets and account assignments i.e. setLinksProvisioningMode orPermissionSetProvisioningMode tos3, then read below for usage instructions:

  • Refer to sample files underdocs\samples\links_data for account assignment operations anddocs\samples\permission_sets for permission set operations

  • After deploying the solution with S3 interface, navigate totarget account and underenv-aws-sso-extensions-for-enterprise-preSolutionArtefactsStack outputs , you will have the S3 locations for uploading your permission sets and account assignments

  • For account assignment operations, uploading a file to the S3 prefix path would map to creating an account assignment and deleting a file from the S3 prefix path would map to deleting an account assignment

  • For permission set operations, uploading a new file to the S3 prefix path would map to creating a permission set, uploading a new copy of the file would map to updating the permission set, and deleting the file would map to deleting the permission set

  • Ensure your deployment account has a cloudtrail. If not, the solution will not be able to provision permission sets when moving in and out of OUs as these events will not register with the event bus.

Security

SeeCONTRIBUTING for more information.

License

This library is licensed under the MIT-0 License. See the LICENSE file.

About

This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution, your identity and access management teams can extend AWS SSO functionality by automating common access management and governance use cases

Topics

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

No packages published

[8]ページ先頭

©2009-2025 Movatter.jp