AWS Identity and Access Management is a web service for securely controlling access to AWS services.
You can use service last accessed data in IAM to help you better understand AWS activity across your organization. You can use this data to create and update service control policies (SCPs) that restrict access to only the AWS services that your organization's accounts use.
For an example, see Using Data to Refine Permissions for an Organizational Unit in the IAM User Guide.
IAM lets you centrally manage root user credentials and perform privileged tasks on member accounts. After you enable root access management, which enables trusted access for IAM in AWS Organizations, you can centrally secure the root user credentials of member accounts. Member accounts can't sign in to their root user or perform password recovery for their root user. The management account or a delegated administrator account for IAM can also perform some privileged tasks on member accounts using short-term root access. Short-term privileged sessions give you temporary credentials that you can scope to take privileged actions on a member account in your organization.
For more information, see Centrally manage root access for member accounts in the IAM User Guide.
Use the following information to help you integrate AWS Identity and Access Management with AWS Organizations.
Enabling trusted access with
IAM
When you enable root access management, trusted access is enabled for IAM in AWS Organizations.
Disabling trusted access with
IAM
For information about the permissions needed to disable trusted access, see Permissions required to disable trusted access.
Only an administrator in the AWS Organizations management account can disable trusted access with AWS Identity and Access Management.
You can only disable trusted access using the Organizations tools.
You can disable trusted access by using either the AWS Organizations console, by running an Organizations AWS CLI command, or by calling an Organizations API operation in one of the AWS SDKs.
To disable trusted service access using the Organizations console
-
Sign in to the AWS Organizations console
. You must sign in as an IAM user, assume an IAM role, or sign in as the root user (not recommended) in the organization’s management account. -
In the navigation pane, choose Services.
-
Choose AWS Identity and Access Management in the list of services.
-
Choose Disable trusted access.
-
In the Disable trusted access for AWS Identity and Access Management dialog box, type disable to confirm, and then choose Disable trusted access.
-
If you are the administrator of only AWS Organizations, tell the administrator of AWS Identity and Access Management that they can now disable that service from working with AWS Organizations using the service console or tools .
Enabling a delegated administrator
account for IAM
When you designate a member account as a delegated administrator for the organization, users and roles from that account can perform privileged tasks on member accounts that otherwise can be performed only by users or roles in the organization's management account. For more information, see Perform a privileged task on an Organizations member account in the IAM User Guide.
Only an administrator in the organization management account can configure a delegated administrator for IAM.
You can specify a delegated administrator account from the IAM console or API, or by using the Organizations CLI or SDK operation.
Disabling a delegated administrator
for IAM
Only an administrator in either the Organizations management account or the IAM delegated admin account
can remove a delegated administrator account from the organization. You can disable delegated administration using the Organizations DeregisterDelegatedAdministrator
CLI or SDK operation.