STS configurability for Route53 dependent actions #3470
Labels
@aws-cdk/aws-certificatemanager
Related to Amazon Certificate Manager
@aws-cdk/aws-iam
Related to AWS Identity and Access Management
effort/large
Large work item – several weeks of effort
feature-request
A feature should be added or improved.
p2
I'm submitting a ...
What is the current behavior?
From a Control Tower managed estate, attempting to create a DNS Validated ACM Certificate using:
Amongst other things, a role is assumed in order to Upsert DNS records to Route53. This fails with an access error:
This is due to the Hosted Zone residing within the
master
account whilst attempting to deploy to a separateproduction
account.Note, custom policies/roles manually added to IAM and an
STS
policy added to the SSO Permission Set have been added to no avail.Allowing the attachment of custom policies to the built-in assumed role or allowing over-riding of said role.
Use case: As mentioned above, we manage the AWS estate with AWS Control Tower and have separate accounts for different business functions. DNS management happens to be in the
management
account but we'd need to enable access from other accounts in order to manage DNS records as public facing stacks need.Please tell us about your environment:
The text was updated successfully, but these errors were encountered: