AWS CodeCommit
User Guide (API Version 2015-04-13)

Cross Account Repository Access: Actions for the Administrator in AccountB

To allow users or groups in AccountB to access a repository in AccountA, the AccountB administrator must create a group in AccountB. This group must be configured with a policy that allows group members to assume the role created by the AccountA administrator.

The following sections provide steps and examples.

Step 1: Create an IAM Group for Repository Access for AccountB Users

The simplest way to manage which IAM users in AccountB can access the AccountA repository is to create an IAM group in AccountB that has permission to assume the role in AccountA, and then add the IAM users to that group.

To create a group for cross-account repository access

  1. Sign in to the AWS Management Console as an IAM user with the permissions required to create IAM groups and policies and manage IAM users in AccountB.

  2. Open the IAM console at

  3. In the IAM console, choose Groups.

  4. Choose Create New Group.

  5. In Group Name, type a name for the group (for example, DevelopersWithCrossAccountRepositoryAccess). Choose Next Step.

  6. In Attach Policy, choose Next Step. You create the cross-account policy in the next procedure. Finish creating the group.

Step 2: Create a Policy and Add Users to the IAM Group

Now that you have a group, create the policy that allows members of this group to assume the role that gives them access to the repository in AccountA. Then add to the group the IAM users in AccountB that you want to allow access in AccountA.

To create a policy for the group and add users to it

  1. In the IAM console, choose Groups, and then choose the name of the group you just created (for example, DevelopersWithCrossAccountRepositoryAccess).

  2. Choose the Permissions tab. Expand Inline Policies, and then choose the link to create an inline policy. (If you are configuring a group that already has an inline policy, choose Create Group Policy.)

  3. Choose Custom Policy, and then choose Select.

  4. In Policy Name, type a name for the policy (for example, AccessPolicyForSharedRepository).

  5. In Policy Document, paste the following policy. In Resource, replace the ARN with the ARN of the policy created by the administrator in AccountA (for example, arn:aws:iam::111122223333:role/MyCrossAccountRepositoryContributorRole), and then choose Apply Policy. For more information about the policy created by the administrator in AccountA, see Step 1: Create a Policy for Repository Access in AccountA.

    { "Version": "2012-10-17", "Statement": { "Effect": "Allow", "Action": "sts:AssumeRole", "Resource": "arn:aws:iam::111122223333:role/MyCrossAccountRepositoryContributorRole" } }
  6. Choose the Users tab. Choose Add Users to Group, and then add the AccountB IAM users. For example, you might add an IAM user with the user name Saanvi_Sarkar to the group.


    Users in AccountB must have programmatic access, including an access key and secret key, to configure their local computers for access to the shared AWS CodeCommit repository. If you are creating IAM users, be sure to save the access key and secret key. To ensure the security of your AWS account, the secret access key is accessible only at the time you create it.