Error assuming role allow-ops-admin-access-from-other-accounts.
#6
-
|
A customer asked:
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Debug logConfirming the IAM user, groups and permissions in questionIn diagnosing the issue, we first ensured that we understood which group the IAM user that the customer was referencing was in. We confirmed it was the and At this point we knew that the user wanted to assumed Next, we double-checked the Reproducing the users's error with aws-authNext, we installed and we were able to reproduce the reported issue: Confirming trust relationships and MFA settingsWe also confirmed that the target account (dev) had a valid trust relationship configured with the security account. At this point we also saw the MFA setting: Discovering the root causeThis means that the successful assumption of the target IAM role would require presenting a valid MFA token! Next, we configured virtual MFA using Google Authenticator within the security account for the target IAM user and retried our same |
Beta Was this translation helpful? Give feedback.
Debug log
Confirming the IAM user, groups and permissions in question
In diagnosing the issue, we first ensured that we understood which group the IAM user that the customer was referencing was in. We confirmed it was the
-access-all-external-accountsgroup that was defined in bothvars/autogen/common_vars.yml:and
security/_global/account-baseline/users.ymlAt this point we…