Error assuming role allow-ops-admin-access-from-other-accounts
.
#6
-
A customer asked:
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Debug logConfirming the IAM user, groups and permissions in questionIn diagnosing the issue, we first ensured that we understood which group the IAM user that the customer was referencing was in. We confirmed it was the
and
At this point we knew that the user wanted to assumed Next, we double-checked the Reproducing the users's error with aws-authNext, we installed
and we were able to reproduce the reported issue:
Confirming trust relationships and MFA settingsWe also confirmed that the target account (dev) had a valid trust relationship configured with the security account. At this point we also saw the MFA setting:
Discovering the root causeThis means that the successful assumption of the target IAM role would require presenting a valid MFA token! Next, we configured virtual MFA using Google Authenticator within the security account for the target IAM user and retried our same
|
Beta Was this translation helpful? Give feedback.
Debug log
Confirming the IAM user, groups and permissions in question
In diagnosing the issue, we first ensured that we understood which group the IAM user that the customer was referencing was in. We confirmed it was the
-access-all-external-accounts
group that was defined in bothvars/autogen/common_vars.yml
:and
security/_global/account-baseline/users.yml
At this point we…