Overview
After bootstrapping accounts, configure access for team members. This page covers:- IAM Identity Center users and groups
- GitHub organization membership
The user performing the bootstrap already exists in IAM Identity Center and GitHub. You must import these existing resources before Terraform can manage them (import instructions below).
Configure User Management
The kit manages both AWS IAM Identity Center and GitHub organization membership from a singleusers.yaml file via Terraform.
Authenticate with GitHub CLI
The Terraform GitHub provider uses credentials from the GitHub CLI. Authenticate with an account that has Owner permissions on your organization:admin.
Add Users
1
Edit the users configuration
Add users to This file is the single source of truth for both GitHub and AWS access.
terraform/live/shared/global/user-management/data/users.yaml:2
Import existing resources
Import your existing IAM Identity Center user, groups, and GitHub membership. Add import blocks to To find the required AWS IDs:To find existing GitHub members:
terraform/live/shared/global/user-management/imports.tf:3
Apply the user-management stack
- IAM Identity Center users
- Group memberships (Admin, PowerUser, ReadOnly)
- Permission set assignments to all accounts
- GitHub organization memberships
Verify Access Configuration
Before proceeding, verify that your existing users and groups are correctly configured in both AWS and GitHub.Review IAM Identity Center
- Open the IAM Identity Center console in your Management account
- Navigate to Users and verify your bootstrap user exists
- Navigate to Groups and verify the expected groups exist (Admin, PowerUser, ReadOnly)
- Check group memberships by clicking on each group
Review GitHub Organization
- Open your GitHub organization’s People page:
https://github.com/orgs/<YOUR_ORG>/people - Verify your bootstrap user appears as an Owner
- Check the Invitations tab for pending invites; users who haven’t accepted their invitation won’t appear in the members list
Groups and Permission Sets
The kit configures three groups with corresponding permission sets:| Group | Permission Set | Access Level |
|---|---|---|
| Admin | AdministratorAccess | Full access to all accounts |
| PowerUser | PowerUserAccess | Full access except IAM |
| ReadOnly | ViewOnlyAccess | Read-only access |