Setting Up SSO Users to Access Workbench-ExecutionRole
This guide provides step-by-step instructions to configure AWS SSO users to assume the Workbench-ExecutionRole
in your AWS account.
Prerequisites
- Access to the management account in your AWS Organization.
- Administrative permissions to modify AWS SSO permission sets.
- The
Workbench-ExecutionRole
must already be deployed via the Workbench AWS CDK stack.
Steps to Update SSO Permissions
1. Log in to the AWS SSO Console
- Login to your 'main' organization AWS Account.
- Go to the IAM Identity Center
2. Find the Relevant Permission Set
- In the left menu, select Permission Sets.
- Locate the permission set used by the group needing access (e.g.,
DataScientist
or another relevant group).
3. Edit the Permission Set
- Select the permission set
- Scroll down to Inline policy and click the the Edit button.
-
Add an inline policy with the following content:
Replace <account-id>
with your AWS account ID, OR for SSO Groups that span multiple accounts you can add both lines for each account.
"Resource": "arn:aws:iam::<account-1>:role/Workbench-ExecutionRole"
"Resource": "arn:aws:iam::<account-1>:role/Workbench-ReadOnlyRole"
"Resource": "arn:aws:iam::<account-2>:role/Workbench-ExecutionRole"
"Resource": "arn:aws:iam::<account-2>:role/Workbench-ReadOnlyRole"\
"Resource": "arn:aws:iam::<account-3>:role/Workbench-ExecutionRole"
"Resource": "arn:aws:iam::<account-3>:role/Workbench-ReadOnlyRole"
Please consult with your AWS SSO Administrator for guidance on this process.
4. Save Changes
- Save the updated permission set.
- AWS SSO will automatically propagate the changes to all users in the associated group.
Verifying Access for SSO Users
- Activate an AWS Profile for the configured SSO group.
-
Use the following CLI command to test access:
aws sts assume-role \ --role-arn arn:aws:iam::<account-id>:role/Workbench-ExecutionRole \ --role-session-name TestSession aws sts assume-role \ --role-arn arn:aws:iam::<account-id>:role/Workbench-ReadOnlyRole \ --role-session-name TestSession
Replace
<account-id>
with your AWS account ID. -
If successful, you will receive temporary credentials.
Troubleshooting
Common Issues
- Permission Denied: Ensure the correct permission set is updated.
- Role Not Found: Verify that the
Workbench-ExecutionRole
has been deployed correctly.
Contact Support
If you encounter issues, please contact your AWS administrator or reach out to the Workbench support team.