

 **Help improve this page** 

To contribute to this user guide, choose the **Edit this page on GitHub** link that is located in the right pane of every page.

# Configure EKS Dashboard integration with Amazon Organizations
<a name="cluster-dashboard-orgs"></a>

This section provides step-by-step instructions for configuring the EKS Dashboard’s integration with Amazon Organizations. You’ll learn how to enable and disable trusted access between services, as well as how to register and deregister delegated administrator accounts. Each configuration task can be performed using either the Amazon console or the Amazon CLI.

## Enable trusted access
<a name="_enable_trusted_access"></a>

Trusted access authorizes the EKS Dashboard to securely access cluster information across all accounts in your organization.

### Using the Amazon console
<a name="using_the_shared_aws_console"></a>

1. Log in to the management account of your Amazon Organization.

1. Navigate to the EKS console in the us-east-1 region.

1. In the left sidebar, select Dashboard Settings.

1. Click **Enable trusted access**.

**Note**  
When you enable trusted access through the EKS console, the system automatically creates the `AWSServiceRoleForAmazonEKSDashboard` service-linked role. This automatic creation does not occur if you enable trusted access using the Amazon CLI or Amazon Organizations console.

### Using the Amazon CLI
<a name="dashboard-enable-cli"></a>

1. Log in to the management account of your Amazon Organization.

1. Run the following commands:

   ```
   aws iam create-service-linked-role --aws-service-name dashboard.eks.amazonaws.com
   aws organizations enable-aws-service-access --service-principal eks.amazonaws.com
   ```

## Disable trusted access
<a name="_disable_trusted_access"></a>

Disabling trusted access revokes the EKS Dashboard’s permission to access cluster information across your organization’s accounts.

### Using the Amazon console
<a name="using_the_shared_aws_console"></a>

1. Log in to the management account of your Amazon Organization.

1. Navigate to the EKS Console in the us-east-1 region.

1. In the left sidebar, select Dashboard Settings.

1. Click **Disable trusted access**.

### Using the Amazon CLI
<a name="using_the_shared_aws_cli"></a>

1. Log in to the management account of your Amazon Organization.

1. Run the following command:

   ```
   aws organizations disable-aws-service-access --service-principal eks.amazonaws.com
   ```

## Enable a delegated administrator account
<a name="_enable_a_delegated_administrator_account"></a>

A delegated administrator is a member account that’s granted permission to access the EKS Dashboard.

### Using the Amazon console
<a name="using_the_shared_aws_console"></a>

1. Log in to the management account of your Amazon Organization.

1. Navigate to the EKS console in the us-east-1 region.

1. In the left sidebar, select Dashboard Settings.

1. Click **Register delegated administrator**.

1. Enter the Account ID of the Amazon Account you want to choose as delegated administrator.

1. Confirm the registration.

### Using the Amazon CLI
<a name="using_the_shared_aws_cli"></a>

1. Log in to the management account of your Amazon Organization.

1. Run the following command, replacing `123456789012` with your account ID:

   ```
   aws organizations register-delegated-administrator --account-id 123456789012 --service-principal eks.amazonaws.com
   ```

## Disable a delegated administrator account
<a name="_disable_a_delegated_administrator_account"></a>

Disabling a delegated administrator removes the account’s permission to access the EKS Dashboard.

### Using the Amazon console
<a name="using_the_shared_aws_console"></a>

1. Log in to the management account of your Amazon Organization.

1. Navigate to the EKS console in the us-east-1 region.

1. In the left sidebar, select Dashboard Settings.

1. Locate the delegated administrator in the list.

1. Click **Deregister** next to the account you want to remove as delegated administrator.

### Using the Amazon CLI
<a name="using_the_shared_aws_cli"></a>

1. Log in to the management account of your Amazon Organization.

1. Run the following command, replacing `123456789012` with the account ID of the delegated administrator:

   ```
   aws organizations deregister-delegated-administrator --account-id 123456789012 --service-principal eks.amazonaws.com
   ```

## Minimum IAM policies required
<a name="dashboard-iam-policy"></a>

This section outlines the minimum IAM policies required to enable trusted access and delegate an administrator for the EKS Dashboard integration with Amazon Organizations.

### Policy for enabling trusted access
<a name="_policy_for_enabling_trusted_access"></a>

To enable trusted access between EKS Dashboard and Amazon Organizations, you need the following permissions:

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "organizations:EnableAWSServiceAccess",
                "organizations:DescribeOrganization",
                "organizations:ListAWSServiceAccessForOrganization"
            ],
            "Resource": "*"
        },
        {
            "Effect": "Allow",
            "Action": [
                "iam:CreateServiceLinkedRole"
            ],
            "Resource": "arn:aws:iam::*:role/aws-service-role/dashboard.eks.amazonaws.com/AWSServiceRoleForAmazonEKSDashboard"
        }
    ]
}
```

### Policy for delegating an administrator
<a name="_policy_for_delegating_an_administrator"></a>

To register or deregister a delegated administrator for the EKS Dashboard, you need the following permissions:

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "organizations:RegisterDelegatedAdministrator",
                "organizations:DeregisterDelegatedAdministrator",
                "organizations:ListDelegatedAdministrators"
            ],
            "Resource": "*"
        }
    ]
}
```

### Policy to view EKS Dashboard
<a name="eks-dashboard-view-policy"></a>

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Sid": "AmazonEKSDashboardReadOnly",
            "Effect": "Allow",
            "Action": [
                "eks:ListDashboardData",
                "eks:ListDashboardResources",
                "eks:DescribeClusterVersions"
            ],
            "Resource": "*"
        },
        {
            "Sid": "AmazonOrganizationsReadOnly",
            "Effect": "Allow",
            "Action": [
                "organizations:DescribeOrganization",
                "organizations:ListAWSServiceAccessForOrganization",
                "organizations:ListRoots",
                "organizations:ListAccountsForParent",
                "organizations:ListOrganizationalUnitsForParent"
            ],
            "Resource": "*"
        },
        {
            "Sid": "AmazonOrganizationsDelegatedAdmin",
            "Effect": "Allow",
            "Action": [
                "organizations:ListDelegatedAdministrators"
            ],
            "Resource": [
                "*"
            ],
            "Condition": {
                "StringEquals": {
                    "organizations:ServicePrincipal": "eks.amazonaws.com"
                }
            }
        }
    ]
}
```

**Note**  
These policies must be attached to the IAM principal (user or role) in the management account of your Amazon Organization. Member accounts cannot enable trusted access or delegate administrators.