You will also need AWS credentials with the ability to deploy CloudFormation templates.
To use this Access Provider, you need to have AWS IAM Identity Center set up in your AWS Organization. Please contact us via Slack if you'd like to use this Access Provider, but are not using IAM Identity Center.
1. Deploy access roles
First, deploy the IAM roles below.
AWS SSO provisioning role
This role is used to list AWS resources including accounts, organizational units, and permission sets. It is also used to provision account assignments.
Deploy this role into the account with the log groups you wish to grant access to:
2. Deploy the Access Provider
To deploy this Access Provider, open a terminal window and assume an AWS role with access to deploy CloudFormation resources in the Common Fate account. Then, run:
cf provider deploy
and select the common-fate/aws Provider when prompted.
Common Fate is a platform that automatically manages access to cloud infrastructure and vital applications, providing users with limited, time-sensitive permissions. It records and audits access data, simplifying compliance and governance processes.
Yes! Registry encourages developers to create and share their own identity and access management providers. By contributing to the registry, you can help expand the range of solutions available to organizations and showcase your expertise in the IAM field.
By using the Common Fate Registry, your organization can access a wide range of official and community-created identity and access management providers. This allows you to customize and enhance your security infrastructure, improve user management workflows, and stay up-to-date with the latest advancements in IAM.