Skip to content

AWS Account Access

Archived (pre-2022)

Preserved for reference only -- likely outdated. View original | Last updated: January 2021

Overview

Fyber N.V disposes multiple AWS accounts across different teams and product pipelines. Accounts are managed by ADFS installed by Office IT. Any user who is assigned to a given AWS account should use his/her AD credentials.

The next diagram illustrates how access to AWS dashboard can be performed:

Screen Shot 2016-05-04 at 18.38.40.png

AWS-ADFS Accounts

Access to AWS resources is specified by ADFS Group which reflects its correspondent Role in AWS.

Roles capabilities

Different AWS groups AD mapped exist per AWS environment:

  1. ADFS-ENV-ADMIN: ADMIN role account
Who is there AWS Services Permissions User/Key_Pairs Mgmt Billing Mgmt
IT-Ops (Core) Services Full Access
  1. ADFS-ENV-SITEOPS: SITEOPS role account
Who is there AWS Services Permissions User/Key_Pairs Mgmt Billing Mgmt
Site-Ops Services Full Access
  1. ADFS-ENV-DEV: DEV role account
Who is there AWS Services Permissions User/Key_Pairs Mgmt Billing Mgmt
Squads/Devs Services Full Access
  1. ADFS-ENV-SEC: SEC role account
Who is there AWS Services Permissions User/Key_Pairs Mgmt Billing Mgmt
Security Read Only Access

5. ADFS-ENV-MGMT: MGMT role account

Who is there AWS Services Permissions User/Key_Pairs Mgmt Billing Mgmt
Management Services Full Access

Where ENV can be: PROD or STG or ENG

SAML configuration setup

The consolidation Account user management in AWS is intended to use one single access point to manage users ONLY registered in Active Directory. The setup is using SSO (Single Sign On) functionality supported by AWS in each account.

The SAML provider uses the following AWS ARN string: arn:aws:iam::ACCOUNT_ID:saml-provider/ADFS

Where ACCOUNT_ID is the ID of each AWS linked and consolidated AWS account.

The current AWS accounts within Fyber N.V Organisation are registered by SAML and mapped to Active Directory as the following:

Account Name Account ID ADFS Contact root acount MFA IAM Users Root MFA Federated Name Email LastPass name Authy name Product Line Status
Fyber NV (Master) 779541029934 - Authy Fyber NV aws.fyber-nv@fyber.com AWS Fyber NV consolidated root Amazon Web Services:root-account@fyber-nv Root account
prod-it-ops 399422659513 Authy DevOps BLN team prod-it-ops hostmaster@sponsorpay.com Amazon AWS root-account-mfa-device@prod-it-ops Legacy OFW only one old instance left - ci.fyber.com
prd-fyber 767648288756 Authy DevOps BLN team prd-fyber aws.tracker@fyber.com AWS Tracker master root-aws@prd-fyber OFW, UA Used
stg-fyber 399797994004 Authy DevOps BLN team stg-fyber aws-hellocloud@fyber.com AWS Tracker STaging root-account-mfa-device@stg-fyber OFW, UA Used
research-development 751747988410 Authy DevOps BLN team Fyber Engineering eng.aws@fyber.com Fyber Engineering Amazon Web Services: eng.aws@fyber.com Unused
business-intelligence 438700835019 Authy DevOps BLN team Business Intelligence aws.bi@fyber.com AWS - BI aws.bi@fyber.com Unused
Training Admin 390237625985 Authy XXX aws.training@fyber.com amazon.com aws.training@fyb@390237265985 Unused
Security STG 763734646817 Authy DevOps BLN team Security - STG aws.sec@fyber.com AWS Security - STG AWS:root-account@security-staging Unused
Office IT 862975725731 Authy Office IT aws.oit@fyber.com AWS for OIT AWS:OIT-root-account-mfa-device@862975725731 Office IT Used
qa-fyber 642716723282 Authy DevOps BLN team qa-fyber aws.prd@fyber.com AWS PRD root-aws.prd.mail@qa-fyber Unused
RTB STG 451181776686 - Silvestre Abruzzo RTB Team DevOps BLN team Henrik Basten aws-dev@falktec.com AWS RTB Staging root AWS@fyber-rtb-staging Unused
Heyzap 985205117128 - Christopher Zutler aws.heyzap-prod@fyber.com ?
RTB PRD 197992572051 - Silvestre Abruzzo RTB Team DevOps BLN team Henrik Basten aws-aunia@falktec.com AWS RTB Production root AWS@fyber-rtb-prod Unused
Inn Dev 931733775016 - Inn Team aws_dev aws.inn-dev@fyber.com Marketplace
Inn STG 747288866571 - Inn Team aws_staging aws.inn-staging@fyber.com Marketplace
Inn PRD 003250186609 - Inn Team, Berlin Team Inneractive USA, INC. aws.inn-prod@fyber.com Marketplace, FairBid Used
~~Inn External~~ ~~136403196126~~ ~~-~~ ~~Inn Team~~ ~~aws_external~~ ~~aws.inn-external@fyber.com~~
Inn QA 311878954612 - Inn Team aws_qa aws.inn-qa@fyber.com
~~Inn 360~~ ~~537374711774~~ ~~-~~ ~~Inn Team~~ ~~aws_360~~ ~~aws_360@inner-active.com~~

XML Metadata for SAML provider:

Accessing AWS dashboard

As mentioned previously, an authorised user can access AWS dashboard by following the next link:  Adfs - Idpinitiatedsignon.Aspx

Pick up AWS from the drop down list from the SSO dashboard:

Screen Shot 2016-05-04 at 18.49.57.png

Enter the personal AD credentials provided by Office-IT:

Screen Shot 2016-05-04 at 18.51.18.png

Once logged in, a new web page will visualise only the group that a user belongs to. The next example illustrates a user which is part of ADFS ADMIN and TEST groups mapped to two different AWS accounts respectively:

Screen Shot 2016-05-04 at 18.53.19.png

Once signed in, it is possible to check from the AWS dashboard the Mapped account USERNAME-AWSACCOUNT as shown the following example:

Screen Shot 2016-05-04 at 18.57.38.png