Closed Bug 1633067 Opened 5 years ago Closed 5 years ago

Request to Enable Single Sign On on AWS Accounts- Engineering Productivity - 8600 and Account ID: 423163539776

Categories

(Testing :: General, task)

Version 3
task

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: schu, Assigned: ahal)

References

Details

Attachments

(1 file)

Hi,

We're reaching out to Mozillians who are responsible for AWS accounts in an effort to standardize the authentication methods used for all of Mozilla's AWS accounts.

By standardizing your account and enabling Mozilla Single Sign On (SSO), you'll be able to use your existing Mozilla SSO web browser session to access AWS (no more typing your AWS password or AWS MFA token needed) and avoid storing static AWS API keys on your laptop. We will improve our ability to deprovision users when an employee leaves, gain enhanced visibility and auditability if your AWS account is compromised, reduce risk of exposure of AWS API keys and avoid manual processes.

We've created a set of instructions for AWS account owner(s) to enable federated AWS login with Single Sign On in your AWS account. The instructions can be found here. We'd like this to be completed within 2 weeks (5/8/20).

After enabling Single Sign on in your AWS account, you'll be able to access your account via the AWS Web Console, the CLI or in code using these instructions.

Once your team has used AWS with Single Sign On for a few weeks, you'll be ready to remove the existing IAM users of the Mozillians that use your AWS account. We will likely follow up with you in this ticket about the removal of those IAM users when the time comes.

If, in the process of enabling Single Sign On in your AWS account, you encounter any problems or have any questions, feel free to ask them here in this bug.

If you'd like to learn more about this project, more detail about the tech and more ways you can implement this single sign on system you can find that on this page.

Flags: needinfo?(glob)
Blocks: 1626082

Kyle,

Since this AWS account is running 100% ActiveData now, are you up to doing this work?

Flags: needinfo?(glob) → needinfo?(klahnakoski)
Assignee: nobody → klahnakoski
Flags: needinfo?(klahnakoski)

This will be wonderful! I will start shortly

Hi Kyle - Let us know if you have any questions.

Sarah Chu - Sorry for the delay. Just wishing for hours in the day. Hopefully I start today so I can still ask questions.

I am stuck at "Test your new setup" in https://mana.mozilla.org/wiki/display/SECURITY/AWS+Federated+Login+Account+Setup

Flags: needinfo?(schu)
Flags: needinfo?(schu) → needinfo?(april)
Attached image sso login result

Going to https://aws.sso.mozilla.com/ I get "Please select a role:" with no options

What does https://sso.mozilla.com/info show for your user groups?

Flags: needinfo?(april)
"groups": [
  "mozilliansorg_heroku-members", 
  "mozilliansorg_cia-aws"
]

I will attempt step two with mozilliansorg_cia-aws. How can I remove the other group?

Flags: needinfo?(april)

Attempted, and failed:

Stack [FederatedIAMRoles] already exists

I think the other must be deleted first

You need to delete a Mozillians group, is that correct?

Flags: needinfo?(april)

I do not believe I need to delete the Mozillians group, rather I think the FederatedIAMRoles stack must be deleted: Step 3 says "Click this link to launch the "Quick create stack" UI to deploy the roles." Now I need the instructions to undo whatever that did. I hope that undoing that step will allow be to create a new stack with the correct Mozillians group ID.

Flags: needinfo?(april)

To fully remove them, you need to remove:

  • CloudFormation:
    • FederatedIAMRoles
  • IAM
    • Roles
      • MAWS-Admin
      • MAWS-ViewOnly
      • MAWS-ReadOnly

That said, you should be able to edit the groups inside the IAM roles. Simply go to the Role and choose Trust relationships --> Edit trust relationship.

Lemme know if that doesn't work for you at all. Thanks!

Flags: needinfo?(april)

Hi Kyle, were you able to give it a try? Did it work out?

Kyle and I metup today and he got the IAM roles deployed.

Yes, I worked with gene to get the account to use SSO. I am leaving this open until I also get a Role connected with another mozillians group

Great to hear that Kyle. After you get that Role connected, we want to make sure that the team is going through the SSO route vs logging into the web console or interacting with the AWS API using their old IAM user API keys. I'll check back in around 30 days.

We’ve added Step 4 for how to delete and disable user roles here : https://mana.mozilla.org/wiki/display/SECURITY/AWS+Federated+Login+Account+Setup#AWSFederatedLoginAccountSetup-Step4of4:Disablinganddeletinguserroles

Thanks

Hey Kyle, were you able to get the role connected?

Flags: needinfo?(klahnakoski)

Andrew, Greg,
Could you help with this? We're trying to find out what additional IAM Role and mozillians group Kyle was working on last month. Do you know remains to be done to ensure the folks that need access to this AWS account get it?

If you're short on context let me know (ping in slack and we can zoom for a few minutes).

Flags: needinfo?(gmierz2)
Flags: needinfo?(ahal)

Kyle was PTO the last little while and just got back, I've just pinged him to check this bug out, he should be able to answer this a lot better than Greg or myself.

Flags: needinfo?(gmierz2)
Flags: needinfo?(ahal)

I am able to connect using https://aws.sso.mozilla.com/ I was able to perform some standard operations while using it.

I will check with ahal and gmierz to ensure they can connect too.

Were your colleagues able to connect successfully?

I was able to connect, I won't speak for gmierz. Thanks!

Yes, we can all connect. There is nothing left to do here.

Flags: needinfo?(klahnakoski)

:kyle,
Glad to hear! Would you go through and delete the IAM users and let me know when it's done or if you encounter problems?

Flags: needinfo?(klahnakoski)

There are a number of IAM users that are using application keys to access their accounts. I can not delete those users.

I can disable console access for everyone so that MAWS is the only way to get to the console:

  • I did this for sparky, ahal, and myself.
  • I have an email out to three others to confirm they no longer require the console.

Hi Kyle, I sent you an invite for next week to have a quick chat.

Greg,
Could you take over completing this for Kyle? Here's what remains to be done :

  1. Confirm that both you and :ahal are able to access the Engineering Productivity (423163539776) AWS account by browsing to https://aws.sso.mozilla.com/
  2. Confirm that indeed the users that should have access to this AWS account are you and :ahal and not Bob Clary, ckolos and glob. If bc ckolos or glob are supposed to have access to the account, please have :ahal add them to the https://mozillians.org/en-CA/group/cia-aws/ mozillians group
  3. Confirm that if either you or :ahal access AWS using either the awscli tool or any AWS SDKs that you have installed the Mozilla AWS CLI tool and confirmed that it works for you
  4. Disable and then delete the existing AWS IAM Users which would include
    • :ahal's user ahal which hasn't been used in the past year
    • Bob Clary's bc user which hasn't been used in years
    • ckolos's ckolos user which was last used 3 months ago
    • Fubar's fubar user
    • glob's glob user which he hasn't used in 9 months
    • glob's glob-dev and glob-dev-ses, neither of which have a password or active API key (they're disabled)
    • Kyle's kyle user
    • Your sparky user

If you have questions or encounter challenges with any of these steps needinfo me and I can help.

Note : The Mozillians group that Kyle setup to govern access to AWS is https://mozillians.org/en-CA/group/cia-aws/

Assignee: klahnakoski → gmierz2
Flags: needinfo?(klahnakoski) → needinfo?(gmierz2)

:ahal,
Greg asked to move this over to you, the steps that remain to be completed are just above in Comment 27. If you have any questions or challenges completing this, needinfo me and I can help.
-Gene

Assignee: gmierz2 → ahal
Flags: needinfo?(gmierz2) → needinfo?(ahal)

(In reply to Gene Wood [:gene] from comment #27)

  1. Confirm that both you and :ahal are able to access the Engineering Productivity (423163539776) AWS account by browsing to https://aws.sso.mozilla.com/

Yes, I can connect.

  1. Confirm that indeed the users that should have access to this AWS account are you and :ahal and not Bob Clary, ckolos and glob. If bc ckolos or glob are supposed to have access to the account, please have :ahal add them to the https://mozillians.org/en-CA/group/cia-aws/ mozillians group

This sounds correct. I assume I can add them at any point in the future if it turns out they need access.

I'll leave 3 and 4 for our meeting later.

Flags: needinfo?(ahal)

I assume I can add them at any point in the future if it turns out they need access.

Yes, you'd just add them to the mozillians access group (which you're the curator of)

:ahal and I metup today and

  • confirmed that he and sparky can get in via SSO
  • removed all IAM users except kyle which is disabled

:ahal will contact kyle to see if his IAM user's API key is used in any scripts or if it was just used for command line activities and will either delete the kyle IAM user or setup a new dedicated IAM user with an API keypair to swap in for whatever scripted stuff kyle had setup.

This AWS account is now cutover to using SSO

Status: NEW → RESOLVED
Closed: 5 years ago
Resolution: --- → FIXED
See Also: → 1525704
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: