AWS - Access for non-UW collaborators

Recommended:   Affiliate NetID Access

By default all UW AWS accounts will be accessed using NetID authentication.   This extends the security provided by NetID authentication & Multi-factor Authentication to UW AWS accounts. (AWS - Sign In to the AWS Management Console )

AWS authorization groups are managed using the campus Manifest service.   

Your collaborator can then be added to an existing Manifest group, or you can create a custom Role & Manifest group:

AWS IAM User Access

If you are creating an AWS IAM user for CLI access please consider using AWS Cloud Shell as an alternative.

NetID login is handled using an identity provider and does not create a native IAM user account within Amazon.   IAM users are most frequently used as service accounts to run processes.   If it is necessary to create an IAM user, please review Security best practices in IAM, in particular using the principle of least privilege.

This account should be secured with Multi-Factor Authentication (MFA) to comply with UW System authentication standards.

See  AWS - Sign In to the AWS Management Console for information on how to log in with an IAM user

See Also:

If you have any questions, feedback or ideas please Contact Us

Commonly Referenced Docs:

UW Madison Public Cloud Team Events
Online Learning Classes for Cloud Vendors
What Data Elements are allowed in the Public Cloud




Keywords:aws management console sign in log login signin access accessing web netid shibboleth manifest saml cloud guest iam root   Doc ID:116183
Owner:Chris L.Group:Public Cloud
Created:2022-01-19 10:20 CDTUpdated:2022-01-20 15:26 CDT
Sites:Public Cloud
Feedback:  0   0