Amazon Identity and Access Management and Amazon Organizations - Amazon Organizations
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Amazon Identity and Access Management and Amazon Organizations

Amazon Identity and Access Management is a web service for securely controlling access to Amazon services.

You can use service last accessed data in IAM to help you better understand Amazon activity across your organization. You can use this data to create and update service control policies (SCPs) that restrict access to only the Amazon services that your organization's accounts use.

For an example, see Using Data to Refine Permissions for an Organizational Unit in the IAM User Guide.

IAM lets you centrally manage root user credentials and perform privileged tasks on member accounts. After you enable root access management, which enables trusted access for IAM in Amazon Organizations, you can centrally secure the root user credentials of member accounts. Member accounts can't sign in to their root user or perform password recovery for their root user. The management account or a delegated administrator account for IAM can also perform some privileged tasks on member accounts using short-term root access. Short-term privileged sessions give you temporary credentials that you can scope to take privileged actions on a member account in your organization.

For more information, see Centrally manage root access for member accounts in the IAM User Guide.

Use the following information to help you integrate Amazon Identity and Access Management with Amazon Organizations.

Enabling trusted access with IAM

When you enable root access management, trusted access is enabled for IAM in Amazon Organizations.

Disabling trusted access with IAM

For information about the permissions needed to disable trusted access, see Permissions required to disable trusted access.

Only an administrator in the Amazon Organizations management account can disable trusted access with Amazon Identity and Access Management.

You can only disable trusted access using the Organizations tools.

You can disable trusted access by using either the Amazon Organizations console, by running an Organizations Amazon CLI command, or by calling an Organizations API operation in one of the Amazon SDKs.

Amazon Web Services Management Console
To disable trusted service access using the Organizations console
  1. Sign in to the Amazon Organizations console. You must sign in as an IAM user, assume an IAM role, or sign in as the root user (not recommended) in the organization’s management account.

  2. In the navigation pane, choose Services.

  3. Choose Amazon Identity and Access Management in the list of services.

  4. Choose Disable trusted access.

  5. In the Disable trusted access for Amazon Identity and Access Management dialog box, type disable to confirm, and then choose Disable trusted access.

  6. If you are the administrator of only Amazon Organizations, tell the administrator of Amazon Identity and Access Management that they can now disable that service from working with Amazon Organizations using the service console or tools .

Amazon CLI, Amazon API
To disable trusted service access using the Organizations CLI/SDK

You can use the following Amazon CLI commands or API operations to disable trusted service access:

  • Amazon CLI: disable-aws-service-access

    Run the following command to disable Amazon Identity and Access Management as a trusted service with Organizations.

    $ aws organizations disable-aws-service-access \ --service-principal iam.amazonaws.com

    This command produces no output when successful.

  • Amazon API: DisableAWSServiceAccess

Enabling a delegated administrator account for IAM

When you designate a member account as a delegated administrator for the organization, users and roles from that account can perform privileged tasks on member accounts that otherwise can be performed only by users or roles in the organization's management account. For more information, see Perform a privileged task on an Organizations member account in the IAM User Guide.

Only an administrator in the organization management account can configure a delegated administrator for IAM.

You can specify a delegated administrator account from the IAM console or API, or by using the Organizations CLI or SDK operation.

Disabling a delegated administrator for IAM

Only an administrator in either the Organizations management account or the IAM delegated admin account can remove a delegated administrator account from the organization. You can disable delegated administration using the Organizations DeregisterDelegatedAdministrator CLI or SDK operation.