Mapping Partner Central Users to Managed Policies
Understanding Partner Central Personas and Policy Mapping
Each persona represents a distinct role within your partner organization with specific access needs to AWS Partner Central features. Match your users to these personas to assign the appropriate managed policy that grants necessary permissions while maintaining security best practices.
Important
All managed policies below grant users access to Amazon Q, an AI-powered assistant providing real-time support and guidance within AWS Partner Central. For more information on Amazon Q, see here.
Common AWS Partner Central User Personas
| User persona | Persona Description | Recommended Partner Central Managed policies | Partner Central responsibilities |
|---|---|---|---|
| IAM Administrator | This individual typically sits in IT Security, Information Security, or Governance/Compliance teams, but this varies by organization. They should have administrator access to the AWS account used to access AWS Partner Central. | This individual should have administrator rights within the AWS account in order to provision users' IAM permissions |
|
| Alliance Lead (Head of AWS Partnership, Director of Cloud Alliances) | Owns the AWS relationship and is responsible for driving growth of the AWS partnership through program alignment, co-sell readiness and cross-functional execution |
These policies combined provision these users with full read and write access to all features in AWS Partner Central. For a detailed breakdown of what this policy contains, see here. |
|
| Program Coordinator (Partner Operations Manager, Alliance Team Member, APN Program Administrator) | Collaborates closely with Alliance Lead to distribute oversight responsibilities by supporting tracking of requirements, management of submissions and ensuring compliance. |
These users are essentially an extension of the Alliance Lead and require similar permissions. These policies combined provisions these users with full read and write access to all features in AWS Partner Central. For a detailed breakdown of what this policy contains, see here. |
|
| Marketing Manager (Partner Marketing Manager, Channel Marketing Lead) | The Marketing Manager builds awareness and drives demand for AWS-aligned offerings. They develop campaigns, create content, and apply for joint marketing programs. |
|
|
| Sales Manager (Account Manager, Account Executive, Business Development Manager) | Accelerate revenue by sourcing, registering and closing AWS-related deals in collaboration with AWS field teams. |
This policy grants users the ability to view and edit the entire pipeline of opportunities within your AWS Partner Central account. This policy is designed for team members who are actively working on partner opportunities and need access to opportunity management features, but don't require access to all Partner Central capabilities. This policy also provides access to other general purpose features, like the ability to access partner documentation, contact support, and track progress with the Scorecard. |
|
| Integration Engineer/Developer | Technical user supporting the partner alliances team with building and maintaining CRM integrations connecting partner systems to AWS Partner Central APIs | AWSFullAccessSandboxFullAccess |
|
| Technical Lead | The Technical Lead is the engineer or architect who ensures their organization's solutions meet AWS technical standards and program requirements. They design and implement scalable cloud architectures, provide technical guidance across teams, and optimize solutions for performance, security, and cost. |
|
|
| Funding Program Manager | The Funding Program Manager owns financial operations tied to AWS—tracking revenue, reconciling payments, and managing funding audits and reporting. |
This policy provides access to manage incentive and benefit programs within AWS Partner Central. |
|
For more information about IAM managed policies, see Managing IAM policies. For information about attaching policies to users and groups, see Attaching a policy to an IAM user group.