Try authenticating as an IAM user to the child accounts
Now that you have IAM users in the security account and IAM roles in the other accounts, it’s time to practice authenticating:
Use your IAM user’s user name and password (decrypted using keybase) to log into the web console of the security account (remember to use the IAM user sign-in URL for the security account).
Follow the steps in Lock down the root account IAM users to lock down your IAM user in the security account. This includes configuring an MFA device for your IAM user.
After configuring an MFA device, log out, and then log back into the security account again, this time providing your MFA token. If you don’t do this, attempting to assume IAM roles in other accounts won’t work, as those roles require an MFA token to be present.
Try to switch to a role in one of the other child accounts using the AWS Web Console. For example, authenticate as one of the IAM users in the security account, and then assume the
allow-full-access-from-other-accounts
role in the dev account (you can find the default list of IAM roles created in each account here).Alternatively, you can use the
aws-vault login xxx
command to login to the AWS Web Console for any profilexxx
that you’ve configured inaws-vault
. For example,aws-vault login logs-from-root
will open up your web browser and log you into the logs account using theOrganizationAccountAccessRole
IAM Role.