Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam AWS Certified Solutions Architect - Professional SAP-C02 All Questions

View all questions & answers for the AWS Certified Solutions Architect - Professional SAP-C02 exam

Exam AWS Certified Solutions Architect - Professional SAP-C02 topic 1 question 309 discussion

A company is using AWS Organizations with a multi-account architecture. The company's current security configuration for the account architecture includes SCPs, resource-based policies, identity-based policies, trust policies, and session policies.

A solutions architect needs to allow an IAM user in Account A to assume a role in Account B.

Which combination of steps must the solutions architect take to meet this requirement? (Choose three.)

  • A. Configure the SCP for Account A to allow the action.
  • B. Configure the resource-based policies to allow the action.
  • C. Configure the identity-based policy on the user in Account A to allow the action.
  • D. Configure the identity-based policy on the user in Account B to allow the action.
  • E. Configure the trust policy on the target role in Account B to allow the action.
  • F. Configure the session policy to allow the action and to be passed programmatically by the GetSessionToken API operation.
Show Suggested Answer Hide Answer
Suggested Answer: ACE 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
airgead
Highly Voted 1 year ago
Answer: C, E, F Attach a policy to the IAM user in Account A > Trust Policy in Account B > GetSessionToken API operation
upvoted 11 times
ele
9 months ago
F is wrong, you cannot use GetSessionToken to configure session policy. You can pass a single inline session policy programmatically by using the policy parameter with the AssumeRole, AssumeRoleWithSAML, AssumeRoleWithWebIdentity, and GetFederationToken API operations. ACE is correct answer.
upvoted 1 times
...
...
Andres123456
Highly Voted 1 year ago
Selected Answer: BCE
- C) Attach an identity-based policy to the IAM user in Account A (allowed to assume IAM role in Acccount B) - E) Configure the trust policy on the target role in Account B (accountID of the trusted account which is Account A) - B) Configure a resource-based policy which allows certain actions on resources which reside in Account B) reference: https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_cross-account-with-roles.html
upvoted 9 times
JMAN1
10 months, 2 weeks ago
IAM roles and resource-based policies delegate access across accounts only within a single partition. For example, assume that you have an account in US West (N. California) in the standard aws partition. You also have an account in China (Beijing) in the aws-cn partition. You can't use an Amazon S3 resource-based policy in your account in China (Beijing) to allow access for users in your standard aws account. So B can't be answer.
upvoted 1 times
...
...
Daniel76
Most Recent 2 weeks, 1 day ago
Selected Answer: ACE
Revising my earlier vote to ACE, agree that resource based policies is not required. SCP though apply restriction rather than allow, reviewing it to ensure it doesn't block this access does make sense.
upvoted 1 times
...
sashenka
3 weeks, 1 day ago
Correct Options: A. Configure the SCP for Account A to allow the action. C. Configure the identity-based policy on the user in Account A to allow the action. E. Configure the trust policy on the target role in Account B to allow the action. Explanation of Incorrect Options: B. Configure the resource-based policies to allow the action: Resource-based policies are typically used to control access to specific resources like S3 buckets, not for cross-account role assumption. D. Configure the identity-based policy on the user in Account B to allow the action: The identity-based policy for users in Account B is not relevant here, as the user in Account A needs permission to assume the role.
upvoted 2 times
...
Syre
1 month, 2 weeks ago
Selected Answer: BCE
SCPs are not necessary at all here...
upvoted 1 times
...
wbedair
1 month, 2 weeks ago
Selected Answer: ACE
the ask is steps to "ASSUME A ROLE" not to "access the resource" . so option B and F are wrong as with A, C, E I can still assume the role regardless of the configuration of resource policy and session policy who can still deny access to the resource
upvoted 1 times
...
Daniel76
3 months ago
Selected Answer: BCE
To allow an IAM user in Account A to assume a role in Account B - we only need identity-based , resource-based and trust policies. Session policy and SCP not required.
upvoted 1 times
...
kgpoj
3 months ago
Selected Answer: ACE
A (SCP) is more relevant than B (resource-based policies) because, while SCPs are not granting permissions, they could potentially restrict actions. Therefore, ensuring that the SCP in Account A (and Account B) does not block the necessary sts:AssumeRole action is important. B (resource-based policies) isn't relevant for the cross-account role assumption in this context.
upvoted 1 times
kgpoj
3 months ago
A: SCPs (Service Control Policies) are used to set permission boundaries at the organizational or account level. SCPs can restrict or allow certain actions, but they do not grant permissions directly. An SCP in Account A would typically not be responsible for directly allowing a user to assume a role in Account B, though it could block the action if not configured properly.
upvoted 1 times
kgpoj
3 months ago
B: Resource-based policies are policies attached directly to AWS resources (like S3 buckets or IAM roles). However, in this scenario, resource-based policies are less relevant because the focus is on role assumption, which is governed by identity policies and trust policies rather than resource-based policies.
upvoted 1 times
...
...
...
alex_heavy
4 months, 1 week ago
Selected Answer: CDE
E Trust policy in B D Identity-based policy on the ROLE in Account B to allow the action (I think typo in question) C Configure the identity-based policy on the user in Account A to allow the action. Just try it in AWS env.
upvoted 1 times
...
trungtd
5 months ago
Selected Answer: BCE
you generally do not need to modify the Service Control Policies (SCPs) to allow one account's IAM users to assume roles in another account, as long as the SCPs do not explicitly deny the required actions (like sts:AssumeRole).
upvoted 2 times
...
9f02c8d
5 months, 2 weeks ago
BCE - SCP is not required here & used for deny not for allow
upvoted 2 times
...
red_panda
5 months, 3 weeks ago
Selected Answer: BCE
Answer is BCE. SCPs are not used for ALLOW actions but for DENY actions at Org level.
upvoted 1 times
...
teo2157
6 months ago
Selected Answer: ACE
The key point here is "The company's current security configuration for the account architecture includes SCPs," so if SCPs are in place, the SCP in the account A has to be configured to allow the action.
upvoted 2 times
...
seetpt
6 months, 2 weeks ago
Selected Answer: ACE
ACE for me
upvoted 2 times
...
titi_r
7 months ago
Selected Answer: BCE
B, C, E are correct answers.
upvoted 2 times
...
VerRi
7 months, 2 weeks ago
Selected Answer: CEF
A: By default, an account is created and added to an AWS Organization inherits a "FullAWSAccess" policy, we don't have to "allow" the action
upvoted 2 times
...
mav3r1ck
7 months, 3 weeks ago
Selected Answer: ACE
Options B, D, and F are not directly relevant to enabling cross-account role assumption in this context: B. Resource-based policies are not typically configured on IAM users but on resources like S3 buckets or KMS keys. D. The identity-based policy on a user in Account B is irrelevant since the action is being initiated by a user in Account A. F. Session policies are used to pass permissions when you create a session for a role or federated user. The GetSessionToken API operation is used with IAM users to create a session with MFA, not for assuming roles across accounts. Therefore, the correct combination of steps is A, C, and E.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...