What you’ll learn
This workshop provides a comprehensive introduction to managing users and access controls within your Fast Foundation environment. You will learn how to create and manage users and groups, including the administration of external users and groups provisioned through identity providers such as Okta. The workshop will also cover best practices for assigning inline policies, applying AWS managed policies, and managing group access across AWS accounts within the Fast Foundation multi-account architecture.Prerequisites
Before starting this workshop, ensure you have:- User management profile configured in your AWS config file
- AWS SSO signed in:
aws sso login --profile <your-project-name>-user-management - Understanding of AWS IAM concepts and group management
Getting Started
Let’s begin by locating the file where user management is accomplished inside the project. In your infrastructure repository, navigate to:inputs.hcl file contains the configuration for the user management module.
If it isn’t there, your before-hooks will generate/sync it on
terragrunt init.
Open a terminal in the main directory, and run terragrunt init.Scenario 1: External IdP with SCIM
An external identity provider (IdP) is a service such as Okta or Azure AD that manages users and groups outside of AWS. When integrated with AWS IAM Identity Center, the SCIM (System for Cross-domain Identity Management) standard is used to automatically provision and synchronize users and groups from the external IdP into AWS.Creating Access Groups for externally created Groups
1
Add access group definition
To create a new access group, add an object inside the This particular Access Group will give Administrator Access to all the users inside the “FastFoundation - Devs” group to the
external_groups key of the inputs.hcl file.workload-development
and workload-production accounts.2
Understand the parameters
Required fields:
name– Unique identifier for the groupdescription– What the group is foraccounts_names– Which AWS accounts members can access
session_duration– How long access tokens remain valid (default: PT1H)relay_state– URL to redirect users after loginaws_managed_policies– AWS-provided policies (by ARN)inline_policies– Custom policies attached to this groupcustomer_managed_policies– ARNs of existing policies in target accounts
3
Apply changes
Save your file and apply:
Scenario 2: External IdP without SCIM
When an external identity provider (IdP) is integrated with AWS without SCIM, only authentication (sign-in) is handled by the IdP through SAML or OIDC. Users and groups are not automatically provisioned into AWS. This means administrators must manually create and manage users and groups in AWS IAM Identity Center (or IAM), and keep them synchronized with the external IdP.Creating an Access Group
To create an access group when using an External IdP without SCIM, follow these instructions.Bear in mind that a group with the same name must exist in the External IdP.
Creating a User
To create a user when using an External IdP without SCIM, follow these instructions.Bear in mind that a user with the same name must exist in the External IdP.
Common Access Group Patterns
Administrative Access
Administrative Access
Full administrative rights to specific accounts:
Development Team
Development Team
Developer access with custom EKS (Elastic Kubernetes Service) permissions:
Read-Only Auditors
Read-Only Auditors
Limited, read-only access for audit and compliance teams:
Add inline policies to access groups
Optionally, you can attach an inline policy to an Access Group. An inline policy is a block of text formatted as an IAM policy that you add directly to your Access Group.1
Add inline policy definition
workload-development
and workload-production accounts.2
Apply changes
Save your file and apply:
Assign Groups to AWS applications
To grant access to a customer-managed application in AWS IAM Identity Center, you can assign groups to the application. All users who are members of that group will automatically inherit access to the application, simplifying access management and ensuring consistent permission handling. In the Infrastructure AWS account:- Go to AWS Identity Center → Applications → Customer managed
- Find and open the application
- Click Assign users and groups
- Switch to the Groups tab
- Select the access groups that need access
- Click Assign