How do your organizations team members access your AWS account resources?

I want to assume an AWS Identity and Access Management (IAM) role in another AWS account. How do I set up cross-account access using IAM?

Short description

You can set up a trust relationship with an IAM role in another AWS account to access their resources. For example, you want to access the destination account from the source account. To do this, assume the IAM role from the source to destination account by providing your IAM user permission for the AssumeRole API. You must specify your IAM user in the trust relationship of the destination IAM role.

Note: You can also assume a role from source IAM role to destination IAM role, instead of using user to role with role chaining. Role chaining works only for programmatic access such as the AWS Command Line Interface (AWS CLI) or API. Role changing can't be used with the AWS Management Console.

Resolution

Source account

1.     similar to the following:

Note: Replace DESTINATION-ACCOUNT-ID and DESTINATION-ROLENAME with your own values.

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "sts:AssumeRole"
      ],
      "Resource": [
        "arn:aws:iam::DESTINATION-ACCOUNT-ID:role/DESTINATION-ROLENAME"
      ]
    }
  ]
}

2.     to your IAM user permissions.

Attach the created policy to your IAM user permissions by following the steps .

Destination account

1.    .

2.    Paste the custom trust policy similar to the following:

Note: Replace SOURCE-ACCOUNT-ID and SOURCE-USERNAME with your own values.

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Principal": {
        "AWS": "arn:aws:iam::SOURCE-ACCOUNT-ID:user/SOURCE-USERNAME"
      },
      "Action": "sts:AssumeRole"
    }
  ]
}

Note: If you don’t have access to create and edit IAM roles and users, then get assistance from the account's owner to complete the process. As a best practice, grant access to your account and resources only to the entities that you trust.

You can modify this policy to allow the assumption of as many source entities to as many destination roles as needed. For example, you can change the Principal value of the destination account trust policy to "AWS": "SOURCE-ACCOUNT-ID". This allows all entities in the source account with the assume role permissions to assume the destination account role. For more information, see and .

Sharing a resource makes it available for use by principals outside of the AWS account that created the resource. Sharing doesn't change any permissions or quotas that apply to the resource in the account that created it.

  • AWS RAM is a Regional service. The principals that you share with can access resource shares in only the AWS Regions in which they were created.

  • Some resources have special considerations and prerequisites for sharing. For more information, see Shareable AWS resources.

  • Enable resource sharing within AWS Organizations

    When your account is managed by AWS Organizations, you can take advantage of that to share resources more easily. With or without Organizations, a user can share with individual accounts. However, if your account is in an organization, then you can share with individual accounts, or with all accounts in the organization or in an OU without having to enumerate each account.

    To share resources within an organization, you must first use the AWS RAM console or AWS Command Line Interface (AWS CLI) to enable sharing with AWS Organizations. When you share resources in your organization, AWS RAM doesn't send invitations to principals. Principals in your organization gain access to shared resources without exchanging invitations.

    When you enable resource sharing within your organization, AWS RAM creates a service-linked role called AWSServiceRoleForResourceAccessManager. This role can be assumed by only the AWS RAM service, and grants AWS RAM permission to retrieve information about the organization it is a member of, by using the AWS managed policyAWSResourceAccessManagerServiceRolePolicy.

    If you no longer need to share resources with your entire organization or OUs, you can disable resource sharing. For more information, see Disabling resource sharing with AWS Organizations.

    Minimum permissions

    To run the procedures below, you must sign in as a principal in the organization's management account that has the following permissions:

    • ram:EnableSharingWithAwsOrganization

    • iam:CreateServiceLinkedRole

    • organizations:enableAWSServiceAccess

    • organizations:DescribeOrganization

    Requirements

    • You can perform these steps only while signed in as a principal in the organization's management account.

    • The organization must have all features enabled. For more information, see Enabling all features in your organization in the AWS Organizations User Guide.

    You must enable sharing with AWS Organizations by using the AWS RAM console or the enable-sharing-with-aws-organization AWS CLI command. This ensures that the AWSServiceRoleForResourceAccessManager service-linked role is created. If you enable trusted access with AWS Organizations by using the AWS Organizations console or the enable-aws-service-access AWS CLI command, the AWSServiceRoleForResourceAccessManager service-linked role isn't created, and you can't share resources within your organization.

    Console

    To enable resource sharing within your organization

    1. Open the page in the AWS RAM console.

    2. Choose Enable sharing with AWS Organizations, and then choose Save settings.

    AWS CLITo enable resource sharing within your organization

    Use the enable-sharing-with-aws-organization command.

    This command can be used in any AWS Region, and it enables sharing with AWS Organizations in all Regions in which AWS RAM is supported.

    $ aws ram enable-sharing-with-aws-organization
    {
        "returnValue": true
    }

    Create a resource share

    To share resources that you own, create a resource share. When you create a resource share, you do the following:

    1. Add the resources that you want to share.

    2. For each resource type that you include in the share, specify the permission to use for that resource type.

      • If only the default permission is available for a resource type, then AWS RAM automatically associates that permission with the resource type and there is no action for you.

      • If more than the default AWS RAM managed permission is available for a resource type, then you must choose the permission to associate with that resource type.

    3. Specify the principals that you want to have access to the resources.

    Considerations

    • The resource types that you can include in a resource share are listed at Shareable AWS resources.

    • You can share a resource only if you own it. You can't share a resource that's shared with you.

    • AWS RAM is a Regional service. When you share a resource with principals in other AWS accounts, they must access each resource from the same AWS Region that it was created in. For supported global resources, you can access those resources from any AWS Region that's supported by that resource's service console and tools. Note that you can view such resource shares and their global resources in the AWS RAM console and tools only in the designated home Region, US East (N. Virginia),

      arn:partition:iam::account:user/user-name
      2. For more information about AWS RAM and global resources, see Sharing Regional resources compared to global resources.

    • If the account you're sharing from is part of an organization in AWS Organizations and sharing within your organization is enabled, any principals in the organization that you share with are automatically granted access to the shared resources without the use of invitations. A principal in an account with whom you share outside of the context of an organization receives an invitation to join the resource share and is granted access to the shared resources only after they accept the invitation.

    • For the following resource types you have seven days to accept the invitation to join the share for the following resource types. If you don't accept the invitation before it expires, the invitation is automatically declined.

      For shared resource types not on the following list, you have 12 hours to accept the invitation to join the resource share. If you try to accept the invitation after 12 hours, RAM fails to process the invitation and the originating account must share the resources again to generate a new invitation.

      • Amazon Aurora – DB clusters

      • Amazon EC2 – capacity reservations and dedicated hosts

      • AWS License Manager – License configurations

      • AWS Outposts – Local gateway route tables, outposts, and sites

      • Amazon Route 53 – Forwarding rules

      • Amazon VPC – Customer-owned IPv4 addresses, prefix lists, subnets, traffic mirror targets, transit gateways, transit gateway multicast domains

    • After you add an organization or an organization unit (OU) to a resource share, changes to the accounts that are in an OU or accounts that join or leave an organization dynamically affect the resource share. For example, if you add a new account to an OU that has access to a resource share, then the new member account automatically receives access to the shared resources.

    • You can add only the organization your account is a member of, and OUs from that organization to your resource shares. You can't add OUs or organizations from outside your own organization to a resource share as principals. However, you can add individual AWS accounts or, for supported services, IAM roles and users from outside your organization as principals to a resource share.

      Not all resource types can be shared with IAM roles and users. For information about resources that you can share with these principals, see Shareable AWS resources.

    Console

    To create a resource share

    1. Open the AWS RAM console.

    2. Because AWS RAM resource shares exist in specific AWS Regions, choose the appropriate AWS Region from the dropdown list in the upper-right corner of the console. To see resource shares that contain global resources, you must set the AWS Region to US East (N. Virginia), (

      arn:partition:iam::account:user/user-name
      2). For more information about sharing global resources, see Sharing Regional resources compared to global resources. If you want to include global resources in the resource share, then you must choose the designated home Region, US East (N. Virginia),
      arn:partition:iam::account:user/user-name
      2.

    3. If you're new to AWS RAM, choose Create a resource share from the home page. Otherwise, choose Create resource share from the page.

    4. In Step 1: Specify resource share details, do the following:

      1. For Name, enter a descriptive name for the resource share.

      2. Under Resources, choose resources to add to the resource share as follows:

        • For Select resource type, choose the type of resource to share. This filters the list of shareable resources to only those resources of the selected type.

        • In the resulting list of resources, select the check boxes next to the individual resources that you want to share. The selected resources move under Selected resources.

          If you're sharing resources that are associated with a specific availability zone, then using the Availability Zone ID (AZ ID) helps you determine the relative location of these resources across accounts. For more information, see Availability Zone IDs for your AWS resources.

      3. (Optional) To attach tags to the resource share, under Tags, enter a tag key and value. Add others by choosing Add new tag. Repeat this step as needed. These tags apply to only the resource share itself, not to the resources in the resource share.

    5. Choose Next.

    6. In Step 2: Associate a permission with each resource type, if more than the default AWS RAM managed permission is available, then you can choose which permission to associate with the resource type. If only the default permission is available, then AWS RAM automatically associates this permission with the resource type. For more information, see .

      To display the actions that the permission allows, expand View the actions that are allowed by this permission.

    7. Choose Next.

    8. In Step 3: Choose principals to grant access, do the following:

      1. By default, Allow sharing with external principals is selected, which means that, for those resource types that support it, you can share resources with AWS accounts that are outside of your organization. This doesn't affect resource types that can be shared only within an organization, such as Amazon VPC subnets. You can also share some supported resource types with IAM roles and users.

        To restrict resource sharing to only accounts and principals in your organization, choose Allow sharing with principals in your organization only.

      2. For Principals, do the following:

        • To add the organization, an organizational unit (OU), or an AWS account that is part of an organization, turn on Display organizational structure. This displays a tree view of your organization. Then, select the check box next to each principal that you want to add.

          • If you select the organization (the ID begins with

            arn:partition:iam::account:user/user-name
            5), then all AWS accounts in the organization can access the resource share.

          • If you select an OU (the ID begins with

            arn:partition:iam::account:user/user-name
            6), then all AWS accounts in that OU and its child OUs can access the resource share.

          • If you select an individual AWS account, then only that account can access the resource share.

          The Display organizational structure toggle appears only if sharing with AWS Organizations is enabled and you're signed in to the management account for the organization.

          You can't use this method to specify an AWS account outside your organization, or an IAM role or user. Instead, you must turn off Display organizational structure and use the dropdown list and text box to enter the ID or ARN.

        • To specify a principal by ID or ARN, including principals that are outside of the organization, then for each principal, select the principal type. Next, enter the ID (for an AWS account, organization, or OU) or ARN (for an IAM role or user), and then choose Add. The available principal types and ID and ARN formats are as follows:

          • AWS account – To add an AWS account, enter the 12-digit account ID. For example:

            arn:partition:iam::account:user/user-name
            7

          • Organization – To add all of the AWS accounts in your organization, enter the ID of the organization. For example:

            arn:partition:iam::account:user/user-name
            8

          • Organizational unit (OU) – To add an OU, enter the ID of the OU. For example:

            arn:partition:iam::account:user/user-name
            9

          • IAM role – To add an IAM role, enter the ARN of the role. Use the following syntax:

            arn:aws:iam::123456789012:user/JohnDoe
            0:iam::
            arn:aws:iam::123456789012:user/JohnDoe
            1:role/
            arn:aws:iam::123456789012:user/JohnDoe
            2

            For example:

            arn:aws:iam::123456789012:user/JohnDoe
            3

          • IAM user – To add an IAM user, enter the ARN of the user. Use the following syntax:

            arn:partition:iam::account:user/user-name

            For example:

            arn:aws:iam::123456789012:user/JohnDoe

      3. For Selected principals, verify that the principals you specified appear in the list.

    9. Choose Next.

    10. In Step 4: Review and create, review the configuration details for your resource share. To change the configuration for any step, choose the link that corresponds to the step you want to go back to and make the required changes.

    11. After you finish reviewing the resource share, choose Create resource share.

      It can take a few minutes for the resource and principal associations to complete. Allow this process to complete before you try to use the resource share.

    12. You can add and remove resources and principals or apply custom tags to your resource share at any time. You can change permission for resource types that are included in your resource share, for those types that support more than the default permission. You can delete your resource share when you no longer want to share the resources. For more information, see Share AWS resources owned by you.

    AWS CLITo create a resource share

    Use the create-resource-share command. The following command creates a resource share that is shared with all of the AWS accounts in the organization. The share contains an AWS License Manager license configuration, and it grants the default permissions for that resource type.

    What are the ways user can access resources in their AWS account?

    You can control access to resources using an identity-based policy or a resource-based policy. In an identity-based policy, you attach the policy to an identity and specify what resources that identity can access. In a resource-based policy, you attach a policy to the resource that you want to control.

    What is the best way to share your AWS account with your team?

    AWS Organizations allows you to group a set of AWS accounts into an organization that you can manage centrally. Once the accounts have joined the organization, you can group them into organizational units (OUs), allowing you to set policies that help you meet your security and compliance requirements.

    Which IAM resources can a company use to provide access to AWS accounts through the AWS management Console?

    You should use IAM roles to grant access to your AWS accounts by relying on short-term credentials, a security best practice. Authorized identities, which can be AWS services or users from your identity provider, can assume roles to make AWS requests. To grant permissions to a role, attach an IAM policy to it.