You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you have the management account as your target, the following error happens in Community::SSO::AssignmentGroup resource type v0.3.1:
Error: Received a 403 status error: Access denied by IAM. Please check your policy, or wait for role propagation to complete. IAM Error: User: arn:aws:sts::123456789012:assumed-role/community-sso-assignmentgroup-resour-ExecutionRole/1111 is not authorized to perform: iam:ListRolePolicies on resource: role AWSReservedSSO_Viewer_1111 (Service: AmazonIdentityManagement; Status Code: 403; Error Code: AccessDenied; Request ID: 1111; Proxy: null): 1111, 123456789012 arn:aws:sso:::permissionSet/ssoins-1111/ps-1111
I gave the resource type execution role with full permission to account and that still did not work.
As a workaround, I used the native type AWS::SSO::Assignment just for the management account.
The text was updated successfully, but these errors were encountered:
If you have the management account as your target, the following error happens in
Community::SSO::AssignmentGroup
resource type v0.3.1:I gave the resource type execution role with full permission to account and that still did not work.
As a workaround, I used the native type
AWS::SSO::Assignment
just for the management account.The text was updated successfully, but these errors were encountered: