Documentation Index
Fetch the complete documentation index at: https://docs.iru.com/llms.txt
Use this file to discover all available pages before exploring further.
About AWS IAM Identity Center (SSO)
This connector targetssso: APIs - permission sets, account assignments, instances, and SSO applications. Users and groups come from Identity Store (identitystore:). AWSSSOReadOnly exists but often needs supplementation; the inline policy below tracks Describe*, Get*, List*, and Search* on sso:.
Deploy the role in the management or delegated administrator account.
How it works
| Detail | Value |
|---|---|
| Category | Identity / access governance |
| Authentication | Cross-account IAM role |
Prerequisites
- IAM Identity Center enabled for the organization.
- Permissions to create roles in management or delegated admin.
Connect IAM Identity Center (SSO) to Iru
Copy the trust policy from Iru
Turn on AWS IAM Identity Center (SSO)
Find AWS IAM Identity Center (SSO) (use Category or Search by name or description). On that card, turn on the toggle. Leave the wizard tab open.
Create the IAM role in AWS
Start Create role
In the management or delegated administrator account, open IAM → Roles → Create role.
Configure trusted entity
Choose AWS account → Another AWS account. Enter
753695775620 (or the ID Iru shows). Enable Require external ID and paste the external ID from Iru.Add the SSO inline policy
Skip attaching only
AWSSSOReadOnly if it misses APIs your audit needs - create an inline policy:Submit the role ARN in Iru
Troubleshooting
Nothing opens when you turn the source on
Nothing opens when you turn the source on
Check pop-up blocker settings for the Iru site and try again.
No assignments
No assignments
Member-account roles cannot see org SSO config - use management/delegated admin.
Applications missing
Applications missing
Confirm
sso:List* / sso:Describe* coverage (wildcard above).Wrong API prefix
Wrong API prefix
SSO management uses
sso:, not identitycenter: for these reads.AssumeRole denied
AssumeRole denied
External ID mismatch.
See also
- AWS IAM Identity Center (Identity Store)
- See Sources Management for the full connector list.
