PermissionSets from master account not visible when TEAM application deployed in delegated-admin account #441
Replies: 1 comment
-
|
Hi! I came across this post when trying to understand why some permission sets were not visible for assignment in Eligibility Policies in the delegated account. It makes sense to me now and I hope this helps -- This is an intentional decision. The reason that these permission sets are not assignable or modifiable is because they are in use to grant access to the master account itself to some user or group. If the delegated account were allowed to modify and assign those permission sets, they could grant themselves complete and full access to the master account via that delegation of Identity Center. The workaround is to create copies of those policies that can then be managed and assigned via the delegated account, to every other account in the Organization except the master Identity Center account. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I'm encountering an issue with permission set visibility in the TEAM application when deployed in a delegated admin account while managing IAM Identity Center PermissionSets from the master account.
Setup
Issue
The current logic in index.py (lines 119-126) appears to intentionally exclude permission sets from the master account when the application runs from a delegated admin account:
Expected Behavior
Since I'm managing all permission sets from the master account, I would expect the TEAM application to display all permission sets, regardless of whether it's deployed in the master account or delegated admin account.
Questions
Would appreciate clarification on whether this is the intended behavior or if there's a recommended approach for this setup.
Beta Was this translation helpful? Give feedback.
All reactions