AWS Identity and Access Management and AWS Organizations
AWS Identity and Access Management is a web service for securely controlling access to AWS services.
You can use service last accessed data in IAM to help you better understand AWS activity across your organization. You can use this data to create and update service control policies (SCPs) that restrict access to only the AWS services that your organization's accounts use.
For an example, see Using Data to Refine Permissions for an Organizational Unit in the IAM User Guide.
IAM lets you centrally manage root user credentials and perform privileged tasks on member accounts. After you enable root access management, which enables trusted access for IAM in AWS Organizations, you can centrally secure the root user credentials of member accounts. Member accounts can't sign in to their root user or perform password recovery for their root user. The management account or a delegated administrator account for IAM can also perform some privileged tasks on member accounts using short-term root access. Short-term privileged sessions give you temporary credentials that you can scope to take privileged actions on a member account in your organization.
For more information, see Centrally manage root access for member accounts in the IAM User Guide.
Use the following information to help you integrate AWS Identity and Access Management with AWS Organizations.
Enabling trusted access with IAM
When you enable root access management, trusted access is enabled for IAM in AWS Organizations.
Disabling trusted access with IAM
For information about the permissions needed to disable trusted access, see Permissions required to disable trusted access.
Only an administrator in the AWS Organizations management account can disable trusted access with AWS Identity and Access Management.
You can only disable trusted access using the Organizations tools.
You can disable trusted access by using either the AWS Organizations console, by running an Organizations AWS CLI command, or by calling an Organizations API operation in one of the AWS SDKs.
Enabling a delegated administrator account for IAM
When you designate a member account as a delegated administrator for the organization, users and roles from that account can perform privileged tasks on member accounts that otherwise can be performed only by users or roles in the organization's management account. For more information, see Perform a privileged task on an Organizations member account in the IAM User Guide.
Only an administrator in the organization management account can configure a delegated administrator for IAM.
You can specify a delegated administrator account from the IAM console or API, or by using the Organizations CLI or SDK operation.
Disabling a delegated administrator for IAM
Only an administrator in either the Organizations management account or the IAM delegated admin account
can remove a delegated administrator account from the organization. You can disable delegated administration using the Organizations DeregisterDelegatedAdministrator
CLI or SDK operation.