In this step we configure the workstation to allow the developer to access the development account.
There are a wide variety of ways an AWS user can be authenticated. See IAM Identity Center authentication.
The two most common ways to authenticate include AWS IAM Identity Center or IAM User Credentials. Other strategies include federated identity provider managed by an organization (such as Azure or Okta), AWS Access Portal, or a custom federated identity provider.
For this install, we assume you access your AWS Account using an AWS IAM Identity Center single sign on (SSO) user.
aws configure sso
SSO session name: lzm-dev
SSO start URL [None]: {use the sso login url for your AWS SSO}
SSO region: {specify your region}
SSO registration scopes [sso:account:access]: {accept this default}
{At this point configure will open an authorization page in your default browser.}
{Accounts your SSO has access to will be listed. Choose the development account.}
CLI default client Region [None]: {specify your region}
CLI default output format [None]: json
CLI profile name [AWSAdministratorAccess-99999999999]: lzm-dev
Test your profile using this command:
aws sts get-caller-identity --profile lzm-dev