

# Amazon Artifact and Amazon Organizations
<a name="services-that-can-integrate-artifact"></a>

Amazon Artifact is a service that allows you to download Amazon security compliance reports such as ISO and PCI reports. Using Amazon Artifact, a user in the organization's management account can automatically accept agreements on behalf of all member accounts in an organization, even as new reports and accounts are added. Member account users can view and download agreements. For more information, see [Managing an agreement for multiple accounts in Amazon Artifact](https://docs.amazonaws.cn/artifact/latest/ug/manage-org-agreement.html) in the *Amazon Artifact User Guide*.

Use the following information to help you integrate Amazon Artifact with Amazon Organizations.



## Service-linked roles created when you enable integration
<a name="integrate-enable-slr-artifact"></a>

The following [service-linked role](https://docs.amazonaws.cn/IAM/latest/UserGuide/using-service-linked-roles.html) is automatically created in your organization's management account when you enable trusted access. This role allows Amazon Artifact to perform supported operations within your organization's accounts in your organization.

You can delete or modify this role only if you disable trusted access between Amazon Artifact and Organizations, or if you remove the member account from the organization.

Although you can delete or modify this role if you remove the member account from the organization, we do not recommend it. 

Modifying the role is discouraged because it can lead to security issues such as the cross-service confused deputy. To learn more about protection against confused deputy, see [Cross-service deputy prevention](https://docs.amazonaws.cn//artifact/latest/ug/security-iam.html#confused-deputy) in the *Amazon Artifact User Guide*. 
+ `AWSServiceRoleForArtifact`

## Service principals used by the service-linked roles
<a name="integrate-enable-svcprin-artifact"></a>

The service-linked role in the previous section can be assumed only by the service principals authorized by the trust relationships defined for the role. The service-linked roles used by Amazon Artifact grant access to the following service principals:
+ `artifact.amazonaws.com`

## Enabling trusted access with Amazon Artifact
<a name="integrate-enable-ta-artifact"></a>

For information about the permissions needed to enable trusted access, see [Permissions required to enable trusted access](orgs_integrate_services.md#orgs_trusted_access_perms).

You can only enable trusted access using the Organizations tools.

You can enable trusted access by using either the Amazon Organizations console, by running a Amazon CLI command, or by calling an API operation in one of the Amazon SDKs.

------
#### [ Amazon Web Services Management Console ]

**To enable trusted service access using the Organizations console**

1. Sign in to the [Amazon Organizations console](https://console.amazonaws.cn/organizations/v2). You must sign in as an IAM user, assume an IAM role, or sign in as the root user ([not recommended](https://docs.amazonaws.cn/IAM/latest/UserGuide/best-practices.html#lock-away-credentials)) in the organization’s management account.

1. In the navigation pane, choose **Services**.

1. Choose **Amazon Artifact** in the list of services.

1. Choose **Enable trusted access**.

1. In the **Enable trusted access for Amazon Artifact** dialog box, type **enable** to confirm, and then choose **Enable trusted access**.

1. If you are the administrator of only Amazon Organizations, tell the administrator of Amazon Artifact that they can now enable that service to work with Amazon Organizations from the service console .

------
#### [ Amazon CLI, Amazon API ]

**To enable trusted service access using the OrganizationsCLI/SDK**  
Use the following Amazon CLI commands or API operations to enable trusted service access:
+ Amazon CLI: [enable-aws-service-access](https://docs.amazonaws.cn/cli/latest/reference/organizations/enable-aws-service-access.html)

  Run the following command to enable Amazon Artifact as a trusted service with Organizations.

  ```
  $ aws organizations enable-aws-service-access \ 
      --service-principal artifact.amazonaws.com
  ```

  This command produces no output when successful.
+ Amazon API: [EnableAWSServiceAccess](https://docs.amazonaws.cn/organizations/latest/APIReference/API_EnableAWSServiceAccess.html)

------

## Disabling trusted access with Amazon Artifact
<a name="integrate-disable-ta-artifact"></a>

For information about the permissions needed to disable trusted access, see [Permissions required to disable trusted access](orgs_integrate_services.md#orgs_trusted_access_disable_perms).

Only an administrator in the Amazon Organizations management account can disable trusted access with Amazon Artifact.

You can only disable trusted access using the Organizations tools.

Amazon Artifact requires trusted access with Amazon Organizations to work with organization agreements. If you disable trusted access using Amazon Organizations while you are using Amazon Artifact for organization agreements, it stops functioning because it cannot access the organization. Any organization agreements that you accept in Amazon Artifact remain, but can't be accessed by Amazon Artifact. The Amazon Artifact role that Amazon Artifact creates remains. If you then re-enable trusted access, Amazon Artifact continues to operate as before, without the need for you to reconfigure the service. 

A standalone account that is removed from an organization no longer has access to any organization agreements.

You can disable trusted access by using either the Amazon Organizations console, by running an Organizations Amazon CLI command, or by calling an Organizations API operation in one of the Amazon SDKs.

------
#### [ Amazon Web Services Management Console ]

**To disable trusted service access using the Organizations console**

1. Sign in to the [Amazon Organizations console](https://console.amazonaws.cn/organizations/v2). You must sign in as an IAM user, assume an IAM role, or sign in as the root user ([not recommended](https://docs.amazonaws.cn/IAM/latest/UserGuide/best-practices.html#lock-away-credentials)) in the organization’s management account.

1. In the navigation pane, choose **Services**.

1. Choose **Amazon Artifact** in the list of services.

1. Choose **Disable trusted access**.

1. In the **Disable trusted access for Amazon Artifact** dialog box, type **disable** to confirm, and then choose **Disable trusted access**.

1. If you are the administrator of only Amazon Organizations, tell the administrator of Amazon Artifact that they can now disable that service from working with Amazon Organizations using the service console or tools .

------
#### [ Amazon CLI, Amazon API ]

**To disable trusted service access using the Organizations CLI/SDK**  
You can use the following Amazon CLI commands or API operations to disable trusted service access:
+ Amazon CLI: [disable-aws-service-access](https://docs.amazonaws.cn/cli/latest/reference/organizations/disable-aws-service-access.html)

  Run the following command to disable Amazon Artifact as a trusted service with Organizations.

  ```
  $ aws organizations disable-aws-service-access \
      --service-principal artifact.amazonaws.com
  ```

  This command produces no output when successful.
+ Amazon API: [DisableAWSServiceAccess](https://docs.amazonaws.cn/organizations/latest/APIReference/API_DisableAWSServiceAccess.html)

------