Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

AWS Organizations SSO PowerUser Can't access or Generate Access Keys

I'm fairly new to AWS Organizations and SSO and I seem to be missing something when it comes to setting up a user.

I've set-up AWS Organizations and SSO OK, and created some OUs and created AWS Accounts within them. I have also sucessfully used SSO to create a new User and assigned them to the PowerUsers Group. The user power-group-user can login fine, and create cloud resources such as EC2s.

But what they can't do is find or create programmatic access keys (AWS_ACCESS_KEY and AWS_SECRET_ACCESS_KEY). Which seems to be a glaring omission from their capabilities.

Have I missed a step in the user set-up, or am I supposed to explicitly grant them permissions for this? It just seems odd that a PowerUser can't generate access keys.


UPDATE to my original question. I have tracked down the missing keys, of sorts. This AWS Blog describes how when you logon via the SSO Console, you get two options for each account: 1) Console Access or 2) Command line or programmatic access. If you choose the latter then you are able to obtain temporary access keys (by default good for 1 hour) directly from the console.

So I guess my question has now changed to: is this how it works with SSO? That is temporary credentials only? I'm guessing that is the case, because I think with SSO I'm assuming Roles, and therefore all credentials will be temporary.

like image 988
P Burke Avatar asked Sep 07 '25 16:09

P Burke


1 Answers

If you're using the "Power users" managed policy, that does not give access to IAM which is where you'd create access keys, etc..

Power user description: Provides full access to AWS services and resources, but does not allow management of Users and groups.

like image 175
Jack Marchetti Avatar answered Sep 11 '25 09:09

Jack Marchetti