You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -16,7 +16,7 @@ You set up a trust policy that looks correct, references the correct SSO role AR
16
16
17
17
It might be because of this critical gotcha edge case: region-specific paths in the SSO role ARNs.
18
18
19
-
I faced this issue myself, along with others on [StackOverflow](https://stackoverflow.com/questions/73639007/allow-user-to-assume-an-iam-role-with-sso-login), [AWS re:Post](https://repost.aws/questions/QUpP-HDDmXT4C1YvjWvoVl_A/aws-identity-center-assumed-role-principals), and even [Reddit](https://www.reddit.com/r/aws/comments/1ml4zjn/trusting_external_customers_aws_idenitity_center/). It's buried in the [AWS documentation](https://docs.aws.amazon.com/singlesignon/latest/userguide/referencingpermissionsets.html) and easy to miss, so I'll cover it in this article to hopefully help others avoid scratching their heads for an hour like I did, and make it easily findable on the Internet.
19
+
I faced this issue myself, along with others on [StackOverflow](https://stackoverflow.com/questions/73639007/allow-user-to-assume-an-iam-role-with-sso-login), [AWS re:Post](https://repost.aws/questions/QUpP-HDDmXT4C1YvjWvoVl_A/aws-identity-center-assumed-role-principals), and even [Reddit](https://www.reddit.com/r/aws/comments/1ml4zjn/trusting_external_customers_aws_idenitity_center/). When pairing with my colleague, Veronika, we asked ChatGPT to troubleshoot this, but even it was unable to provide the correct solution. It's a small but important piece of information that's buried in the [AWS documentation](https://docs.aws.amazon.com/singlesignon/latest/userguide/referencingpermissionsets.html) and easy to miss, so I'll cover it in this article to hopefully help others avoid scratching their heads for an hour like I did, and make it easily findable on the Internet.
20
20
21
21
## The Problem
22
22
@@ -143,8 +143,12 @@ Here's an example IAM trust policy that allows SSO users from the Administrator
143
143
"Condition": {
144
144
"ArnLike": {
145
145
"aws:PrincipalArn": [
146
-
// Instead of us-west-2, you can also use * to allow any region.
147
-
// The wildcard (*) at the end of the ARN AWSReservedSSO_AWSAdministratorAccess* is also important, as there's no need to hardcode the randomly generated ID.
146
+
// It's worth noting that if Disaster Recovery (multi-region) is a priority
147
+
// or when using IaC such as Terraform, instead of hardcoding the region like us-west-2,
148
+
// it may be better to use `/*/` (which doesn't impose any security risks either).
149
+
150
+
// The wildcard (*) at the end of the ARN AWSReservedSSO_AWSAdministratorAccess* is
151
+
// also important, as there's no need to hardcode the randomly generated ID.
0 commit comments