Managing AWS OpsWorks Stacks Users - AWS OpsWorks

Managing AWS OpsWorks Stacks Users

Important

The AWS OpsWorks Stacks service reached end of life on May 26, 2024 and has been disabled for both new and existing customers. We strongly recommend customers migrate their workloads to other solutions as soon as possible. If you have questions about migration, reach out to the AWS Support Team on AWS re:Post or through AWS Premium Support.

Before you can import users into AWS OpsWorks Stacks and grant them permissions, you must first have created a user for each individual. To create IAM users, start by signing in to AWS as a user that has been granted the permissions defined in the IAMFullAccess policy. You then use the IAM console to create IAM users for everyone who needs to access AWS OpsWorks Stacks. You can then import those users into AWS OpsWorks Stacks and grant user permissions as follows:

Regular AWS OpsWorks Stacks Users

Regular users don't require an attached policy. If they do have one, it typically does not include any AWS OpsWorks Stacks permissions. Instead, use the AWS OpsWorks Stacks Permissions page to assign one of the following permissions levels to regular users on a stack-by-stack basis.

  • Show permissions allow users to view the stack, but not perform any operations.

  • Deploy permissions include the Show permissions and also allow users to deploy and update apps.

  • Manage permissions include the Deploy permissions and also allow users to perform stack management operations, such as adding layers or instances, use the Permissions page to set user permissions, and enable their own SSH/RDP and sudo/admin privileges.

  • Deny permissions deny access to the stack.

If these permissions levels are not quite what you want for a particular user, you can customize the user's permissions by applying an IAM policy. For example, you might want to use the AWS OpsWorks Stacks Permissions page to assign Manage permissions level to a user, which grants them permissions to perform all stack management operations, but not to create or clone stacks. You could then apply a policy that restricts those permissions by denying them permission to add or delete layers or augments those permissions by allowing them to create or clone stacks. For more information, see Managing AWS OpsWorks Stacks Permissions by Attaching an IAM Policy.

AWS OpsWorks Stacks Administrative Users

Administrative users are the account owner or an IAM user with the permissions that are defined by the AWSOpsWorks_FullAccess policy. In addition to the permissions granted to Manage users, this policy includes permissions for actions that cannot be granted through the Permissions page, such as the following:

  • Importing users into AWS OpsWorks Stacks

  • Creating and cloning stacks

For the complete policy, see Example Policies. For a detailed list of permissions that can be granted to users only by applying an IAM policy, see AWS OpsWorks Stacks Permissions Levels.

Users and Regions

AWS OpsWorks Stacks users are available within the regional endpoint in which they were created. You can create users in any of the following Regions.

  • US East (Ohio) Region

  • US East (N. Virginia) Region

  • US West (Oregon) Region

  • US West (N. California) Region

  • Canada (Central) Region (API only; not available in the AWS Management Console

  • Asia Pacific (Mumbai) Region

  • Asia Pacific (Singapore) Region

  • Asia Pacific (Sydney) Region

  • Asia Pacific (Tokyo) Region

  • Asia Pacific (Seoul) Region

  • Europe (Frankfurt) Region

  • Europe (Ireland) Region

  • Europe (London) Region

  • Europe (Paris) Region

  • South America (São Paulo) Region

When you import users to AWS OpsWorks Stacks, you import them to one of the regional endpoints; if you want an user to be available in more than one Region, you must import the user to that Region. You can also import AWS OpsWorks Stacks users from one Region to another; if you import a user to a Region that already has a user with the same name, the imported user replaces the existing user. For more information about importing users, see Importing Users.