AWS: Managing Access to Identity Center Permission Sets

This example has two accounts and two groups; we model access to a Staging and a Production account. Here we have two groups: R&D and Prod Access. Members of the R&D groups are allowed full access to resources within the Staging account and read-only access to resources within the Production Account. Members of the Prod Access group are given full access to EC2 and S3 inside the Production Account.

We will be using Abbey to allow a user to request ComputeFullAccess to the Sandbox account by being adding users to a Permission Set.

Before you start

  1. Make sure you have:

  2. Make sure you setup:

Step 1: Configure AWS Resources

Configure Sandbox Account ID

locals {
-  organizations_account_sandbox_id = [for a in : if == "replaceme"][0] # Replace with your AWS Account ID.
+  organizations_account_sandbox_id = [for a in : if == "1234"][0]

Configure Provider Configuration

provider "aws" {
-  region = "us-east-1" # Replace with your region.
+  region = "us-east-1"

Step 2: Configure your Grant Kit

Configure Output

Grant Kits rely on your GitHub account and repository name to output access changes, which we'll set through Terraform local variables. Update the locals block in with your account_name and repo_name

 locals {
  account_name = "" #CHANGEME
  repo_name = "" #CHANGEME

Configure Reviewers

Workflow defines who should approve an access request.

Let's update the reviewers block by adding yourself as the reviewer by switching with the email address you use to sign into Abbey.

 resource "abbey_grant_kit" "..." {
   workflow = {
     steps = [
         reviewers = {
-          one_of = [""] # CHANGEME
+          one_of = [""]

Now you'll need to link AWS Identity Center with Abbey.

curl -X POST \
  -H "Authorization: Bearer $ABBEY_API_TOKEN" \
  -H 'Content-Type: application/json' \<user_id>/apps \
  -d '{"type": "aws_identitystore", "data": {"id": "<your AWS Identity Center user ID>"}}'

Step 4: Deploy Your Starter Kit

First, add your GitHub-related secrets to your repo's repository secrets:




You can find the AWS keys in your AWS account.

The ABBEY_TOKEN is your API token.

What should it look like?

To deploy your Starter Kit, follow instructions from Deploy Your Grant Kit.

Step 5: Automate Access Management

🎉 Congratulations! Abbey is now managing permissions to your Resource for you. 🎉

You can now start requesting and approving access by following the Request Access and Approve or Deny Access Requests guides.

Abbey strives to help you automate and secure access management without being intrusive.

To that end, this Pull Request contains native Terraform HCL code using normal open source Terraform Provider libraries. It represents the permissions change. In this case, it's just a simple creation of a new Terraform Resource.

After approving the request, you will be able to see that the Identity Center User has been added to the Permission Set in the AWS Identity Center console.

Next Steps

To learn more about what Privacy Policy you can configure, try one of our Step-by-Step Tutorials.

For more information on how Abbey works, visit the Key Concepts or Grant Kits page.

Last updated