09-18-2020 04:55 AM
Greetings,
This is a lab environment. The cAPIC is deployed in one of the regions in AWS. The cAPIC is provisioned with initial configuration and the dual CSRv(s) are up. cAPIC is added as a site in the Cisco MSO. (Cisco MSO is located in the on-prem environment). The configure Infra is provisioned with Multi-Site and additional configuration. The IPSec, OSPF and BGP sessions are up.
The next step is to create a Tenant. When creating a tenant with AWS programmatic access key, it's throwing an exception that Account ID is already used for the Infra Tenant.
Though, when adding the Infra Tenant, no programmatic access key was provided and cAPIC admin/<password> was provided only.
As a workaround, a new sub-organization (for an example: sub-org-a) was created on the main AWS account and the account ID was used for the sub-organization (sub-org-a). At this point, the Tenant was created and pushed to both on-prem and capic.
The question is that is there any limitation, that user account of AWS must counts towards the root account (either main organization or sub-organization) and tenant represents a single user root account in the AWS?
09-18-2020 05:10 AM - edited 09-18-2020 05:24 AM
If you want to manage policies for AWS Organization accounts through the Cloud APIC, the Cloud APIC must be deployed in the master account.
The Cloud APIC uses the OrganizationAccountAccessRole IAM role to manage policies for AWS Organization tenants.
If you created an AWS account within the existing organization in the master account, the OrganizationAccountAccessRole IAM role is automatically assigned to that created AWS account. You do not have to manually configure the OrganizationAccountAccessRole IAM role in AWS in this case.
If the master account invited an existing AWS account to join the organization, then you must manually configure the OrganizationAccountAccessRole IAM role in AWS. Configure the OrganizationAccountAccessRole IAM role in AWS for the organization tenant and verify that it has Cloud APIC-related permissions available
Regarding the tenant question: each tenant must be in a separate AWS account. Sharing the same AWS account for multiple tenants is not allowed. For all non-infra tenants, the AWS provider is configured either as a trusted tenant or untrusted tenant
Stay safe,
Sergiu
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide