Skip to content

Commit

Permalink
Changelog.md (#7)
Browse files Browse the repository at this point in the history
* Test

* Updated Changelog.md

* Fixed diagram relative link

* Fixed diagram. Step 6
  • Loading branch information
ashmeetp authored Feb 26, 2023
1 parent 71806a1 commit 0d9b341
Show file tree
Hide file tree
Showing 3 changed files with 36 additions and 1 deletion.
35 changes: 35 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,3 +10,38 @@
- Default session duration is set to 1 hour.
- Updated the permission set example 1-example-admin.json.

## 2.0.0
- Updated identity-center-stacks-parameters.json to get additional parameters from users to support delegated administration for Identity Center and AWS Control Tower enabled accounts.
- Check if admin is delegated for IAM Identity Center.
- Check if AWS Control Tower is enabled.
- Check if administrative IAM user or role for Identity Center exists in account or to deploy a new IAM role.
- Check if administrative IAM user or role for KMS exists in account or to deploy a new IAM role.
- Updated codepipeline-stack.template to support delegated administration for Identity Center and AWS Control Tower enabled accounts.
- Updated S3 bucket name to make it a unique identifier.
- Added permissions to CodeBuild IAM role to create, update and delete DynamoDB table.
- Updated CodePipeline pipeline name from Identity-Center-Automation-Sample-Solution to Identity-Center-Automation-Solution.
- Added IC-Delegate-Admin.yml to allow delegating administration for IAM Identity Center to a Organization member account.
- Updated architecture_diagram.png to reflect new features in the architecture diagram.
- Updated identity-center-automation.template to support delegated administration for Identity Center and AWS Control Tower enabled accounts.
- Added additional parameters to support management account and Control Tower provisioned permission sets and assignments.
- Added DynamoDB table to store skipped permission set names and ARNs, if necessary.
- Added additional environment variables to Lambda functions auto-permissionsets and auto-assignment.
- Added permissions to add, remove and batch update skipped permission set names and ARNs to the DynamoDB table
- Added permissions to Lambda execution IAM role to get the list of accounts for a provisioned Permission Set to support delegated admin and Control Tower enabled feature.
- Updated identity-center-s3-bucket.template to support delegated administration for Identity Center and AWS Control Tower enabled accounts.
- Added additional parameters and corresponding conditions to check if Identity Center and KMS administrator role or user exists in the account, if not, added an option to create as a part of the stack.
- Updated S3 bucket and KMS key policy to include the appropriate admin IAM roles as principals.
- Exported outputs to be imported by the identity-center-automation.template if new IAM roles are created.
- Updated buildspec-param.yml to support delegated administration for Identity Center and AWS Control Tower enabled accounts.
- Updated commands to pass the additional parameters to the corresponding CloudFormation stacks.
- Updated auto-assignment.py to support delegated administration for Identity Center and AWS Control Tower enabled accounts.
- Added code to skip Permission Sets provisioned in management account if Control Tower is enabled or if a Organization member account is delegated as an administrator for Identity Center.
- Added code to skip permission sets tagged with tag key ManagedBy and value ControlTower in order to prevent the automation from removing Permission Sets created by Control Tower.
- Updated auto-permissionsets.py to support delegated administration for Identity Center and AWS Control Tower enabled accounts.
- Added code to skip Permission Sets provisioned in management account if Control Tower is enabled or if a Organization member account is delegated as an administrator for Identity Center.
- Added code to add skipped permission set names and ARNs the DynamoDB table visibility and auditing.
- Added code to skip permission sets tagged with tag key ManagedBy and value ControlTower in order to prevent the automation from removing Permission Sets created by Control Tower and add permission set names and ARNs to IC-SkippedPermissionSets for visibility and auditing.
- Updated code to sync skipped permission sets with DynamoDB table to ensure items in the table are not in drift
- Updated code to handle existing Permission Sets without description.
- Updated code to remove drift when triggered by EventBridge rule on detecting manual changes to Identity Center

2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -159,7 +159,7 @@ This also recommended as a best practice:

### Architecture Diagram

![Image of Identity_Center_Solution_Diagram](diagram/Architecture_diagram.png)
![Image of Identity_Center_Solution_Diagram](diagram/architecture_diagram.png)

### This solution covers the following scenarios:
- If any change had been made through another approach without updating JSON mapping files in the source, such as deleting a permission set, will this solution be able to detect and fix those drifts?
Expand Down
Binary file modified diagram/architecture_diagram.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 0d9b341

Please sign in to comment.