Thanks to visit codestin.com
Credit goes to Github.com

Skip to content

sam-osung/AWS-IAM-Identity-Center-Organizations-

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 
Β 
Β 

Repository files navigation

AWS IAM, Identity Center & Organizations Project Documentation

Overview

This project demonstrates how to build a secure and organized multi-account AWS environment using AWS Organizations, AWS IAM Identity Centre, and permission sets. It walks through account structuring, user management, access control, and enforcing best practices like Multi-Factor Authentication (MFA) to ensure security and governance in a cloud-native environment.

Project Objectives

The following objectives was set out for the project:

  • Set up and manage multiple AWS accounts under one AWS Organization.
  • Create users and assign them to appropriate groups using AWS IAM Identity Centre.
  • Define and assign custom permission sets.
  • Implement and enforce MFA for all users.
  • Enable cross-account access governed by role-based permissions.
  • Document the entire process with screenshots for reference and future auditing.

Tools and Services Used

  • AWS Organizations
  • AWS IAM Identity Centre
  • AWS IAM
  • Permission Sets
  • MFA
  • Notion (for publishing project results)

Project Architecture

17522959197638222651105200860527

1. AWS Organization Setup

Tasks Completed:

  • Created a root/management account.
  • Added one member account successfully and named it Development.
  • Attempted to add additional accounts: Staging and Production.

❗ Issue Encountered:

  • AWS returned the error: "You have exceeded the allowed number of AWS accounts."

Root Cause:

  • AWS imposes a default limit on the number of accounts in an organization for new AWS accounts.

Troubleshooting Action:

  • Submitted a quota increase request via AWS Support Console.
  • Continued with the rest of the project while awaiting approval.

17522959706283399924504282904502

17522959969171650400278523213879

2. AWS IAM Identity Centre - User and Group Creation

Tasks Completed:

  • Enabled AWS IAM Identity Centre.
  • Created five users:
    • Iniabasi Okorie
    • Chioma Okechukwu
    • Samuel Osung
    • Kelechi Light
    • Emmanuel Nnaemeka
  • Created the following groups:
    • Admin-Team β†’ Assigned: Iniabasi Okorie
    • DevOps-Team β†’ Assigned: Samuel Osung ,Emmanuel Nnaemeka
    • Developer-Team β†’ Assigned: Chioma Okechukwu , Kelechi Light

17522960299445204783257303554013

17522960537524948904539288127767

3.Creation of Permission Sets

Tasks Completed:

  • Created the following custom permission sets:
    • Admin-Permission
    • PowerUser-Permission
    • SystemAdmin-Permission
    • DataScientist-Permission

17522960732562136927356288121564

4. Assigning Permissions to Groups

Mapping:

  • Admin-Team β†’ Administrator-Permission, System Admin Permission, PowerUser Access.
  • DevOps-Team β†’ Administrator-Permission, Data Scientist Admin, PowerUser Access.
  • Developer-Team β†’ System Admin Permission, Administrator-Permission, PowerUser Access

17522961116149212985961441787199

17522961330264747252048679112644

17522961503097153806560180251157

5. Enabling MFA for All Users

Tasks Completed:

  • Enforced MFA across all IAM Identity Center users.
  • Configured each user to register a virtual MFA device.

17522961909542379913718645717705

17522962194367431274997942794266

17522962382238402918383128195102

17522962594668914502278794656314

17522962782269078239131542739770

6. Account Access Configuration

Task Overview:

  • All users granted access to all three AWS accounts via Identity Centre.
  • Permissions restricted by group assignments.

17522963116745351874187663000888

17522963314868636558437180697694

17522963497652554158925736717725

17522963713649034378851395440806

17522963964025900869720655507825

7. Login Demonstration and SSO Account Switching

Steps Demonstrated:

  • Each user logged in via the Identity Centre portal.
  • MFA successfully used.
  • Demonstrated switching between AWS accounts using SSO.

17522964285372059618273402231475

17522964519887727348031075601974

1752296472927720104081354272041

17522964975165736328395064136555

17522965161964353762505421237864

Timeline

Task Status Time Taken
πŸ“„ AWS Organization Setup Completed ~5 mins
πŸ“„ IAM Identity Centre Setup Completed ~5 mins
πŸ“„ Permission Set Configuration Completed ~10 mins
πŸ“„ MFA Enforcement Completed ~5 mins
πŸ“„ Access Testing & Switching Completed ~10 mins
πŸ“„ Documentation & Screenshots Completed ~2 hours

Conclusion:

This project provided a practical understanding of identity and access management in AWS.

It highlighted key concepts such as least privilege, centralized account management, and MFA enforcement.

The experience also reflected real-world troubleshooting and documentation expectations.

By completing this setup, I now have hands-on familiarity with the foundational building blocks for secure enterprise-grade cloud environments using AWS.

About

Built secure AWS multi-account setup using Organizations, IAM Identity Center, permission sets & MFA.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published