aws-teams/roles vs. aws-identity-center #105
-
|
Hello, I'm building our authorization model on the |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 2 replies
-
|
That’s a great question, and it’s something we’re evaluating ourselves right now. We use AWS Identity Center to grant access to permission sets, but the
However with the recent release of Atmos Auth, this dynamic role assumption can now be handled directly within Atmos! Instead of chaining through Yet one remaining consideration is Terraform state access. Most permission sets don’t include access to the centralized backend by default, so this would need to be addressed either by deploying account-specific state or granting additional access to the required permission sets. Atmos Auth was released last week, but it represents a clear path forward toward simplifying the identity architecture. One of the main goals of implementing Atmos Auth was to eventually deprecate the |
Beta Was this translation helpful? Give feedback.
-
|
Hi @j4zzcat , Following up to see if this discussion is resolved on your end. If this answers your question, please feel free to close the discussion. Let us know if there are any remaining gaps or edge cases you’d like to explore. |
Beta Was this translation helpful? Give feedback.
Following up on this now, since we have completely eliminated aws team/role usage!
Atmos auth doesnt eliminate team/role usage on its own, but it enables us to select a specific identity for each stack. That we can specify a different role or permission set in each, and no longer need to use
account-mapto assume a Terraform role in the target account during Terraform execution. Atmos now assumes the role before running Terraform. That way we can simply execute Terraform with a predefined Permission Set in each account (or IAM role for machine users)