AWS Account Management¶
The AWS Accounts page allows you to connect, configure, and manage multiple AWS accounts within TagOps, enabling centralized tagging operations across your entire AWS organization.
Adding an AWS Account¶
Prerequisites¶
Before adding an account:
- [ ] AWS account with administrative access
- [ ] 12-digit AWS account ID
- [ ] Permissions to create CloudFormation stacks
- [ ] Permissions to create IAM roles
Step-by-Step Process¶
1. Open Add Account Dialog¶
- Navigate to AWS Accounts page
- Click Add AWS Account button
- Account creation dialog appears
Free Trial Limitation
Free Trial accounts can only add 1 AWS account. Upgrade to add more accounts.
2. Fill Account Information¶
Account Name (Required) - Friendly name for the account - Examples: "Production", "Dev Environment", "Marketing Account" - 1-50 characters - Letters, numbers, spaces, hyphens, underscores allowed
AWS Account ID (Required)
- Your 12-digit AWS account number
- Numbers only
- Find in AWS Console → Account Settings
- Example: 123456789012
IAM Role Name (Required)
- Default: tagops-exec-account-role
- 1-64 characters
- Letters, numbers, and _+=,.@- allowed
- No spaces
External ID (Required)
- Auto-generated random string
- Click Generate to create new ID
- Copy to use in CloudFormation
- Example: Xy9Pq4Mn2Lk7
3. Create CloudFormation Stack¶
TagOps provides two options:
Option A: Automated (Recommended)
- Click Provision CloudFormation Stack
- New tab opens to AWS CloudFormation console
- Parameters are pre-filled
-
Review the configuration:
Stack name: cf-tagops-onboarding RoleName: tagops-exec-account-role ExternalId: [your generated ID] -
Check "I acknowledge that AWS CloudFormation might create IAM resources"
- Click Create Stack
- Wait for stack status:
CREATE_COMPLETE(1-2 minutes)
Option B: Manual
- Click Copy CF Link
- Save the link for later
- Open link in AWS CloudFormation console
- Follow same steps as Option A
4. Verify Account¶
After CloudFormation stack completes:
- Return to TagOps dialog
- Click Verify Account
-
TagOps performs verification:
- ✅ IAM role exists
- ✅ Trust policy configured correctly
- ✅ Required permissions granted
- ✅ AssumeRole works
- ✅ CloudTrail status checked
5. Complete Account Addition¶
- After successful verification, click Add Account
- TagOps registers the account
- Account appears in the accounts table
- Success notification displays:
Account Added Successfully! "Production Account" has been added successfully. Configure services to scan.
CloudTrail Warning
If CloudTrail is not enabled, you'll see a warning notification. Event-based tagging features will be limited without CloudTrail.
Permissions Warning
If some permissions are missing, you'll see a warning notification. TagOps features wil be limited.
Account Status Indicators¶
Active (Green)
- Account connected and functioning
- All checks passing
Inactive (Yellow)
- Account connected but not in use
- Or temporary access issues
Error (Red)
- Connection problems
- Permission issues
- Role configuration errors
CloudTrail Warning Icon (⚠️)
- Appears when CloudTrail is not enabled
- Hover for details
- Affects event-based tagging capability
Account Role permissions Warning Icon (⚠️)
- Appears when customer tagops role missing permissions
- Hover for details
- Affects event-based and scan tagging capability
Editing an Account¶
What Can Be Modified¶
Editable:
- Account Name
- IAM Role Name
Non-Editable:
- AWS Account ID (permanent)
- External ID (security requirement)
Edit Process¶
- Click Edit button for the account
- Edit Account dialog opens
- Modify Account Name or IAM Role Name
-
If changing IAM Role Name:
- Click Update CloudFormation Stack
- Update the stack in AWS Console
- Update role name parameter
- Click Verify Account to confirm changes
- Click Update Account
IAM Role Updates
If you change the IAM Role Name, you must update the CloudFormation stack in your AWS account to match.
Removing an Account¶
Deletion Process¶
- Click Remove button for the account
- Confirmation dialog appears
-
Review what will be deleted:
- Account connection from TagOps
- Scan configurations
- Inventory data
- Tagging history
- Scheduled scans
-
Confirm deletion
- Account removed from TagOps
Data Loss
Deleting an account removes all associated data from TagOps. This action cannot be undone.
CloudFormation Cleanup¶
After deleting an account, clean up AWS resources:
- CloudFormation Cleanup Dialog appears
- Click Delete CloudFormation Stack
- Opens AWS Console to stack
- Delete the stack to remove IAM role
- Prevents orphaned resources in your AWS account
Alternatively: - Click Copy CF Link to save cleanup link - Click Later to dismiss dialog
Account Limits¶
Subscription Tiers¶
Free Trial - Maximum: 1 AWS account - Shows warning when limit reached - Upgrade button to increase limit
Standard Plans - Fixed number of accounts per plan - No per-account limit shown
Tiered Plans
- Custom account limits (e.g., 5, 10, 25, 50+)
- Shows current usage: 3/10 accounts
- Warning when approaching limit
Reaching Account Limits¶
When at maximum accounts:
⚠️ Free Trial Account Limit Reached
You've reached the maximum of 1 AWS Account for Free Trial users.
Upgrade your subscription to connect multiple AWS accounts.
[Upgrade Button]
Actions: - Click Upgrade to view subscription plans - Remove an existing account to add a different one - Contact support for enterprise limits
Account Configuration¶
After adding an account, configure:
Allowed Regions¶
Define which AWS regions TagOps should monitor:
- Go to Settings → Account Settings
- Select the account
- Edit Allowed Regions
- Save configuration
Allowed Services¶
Control which AWS services to scan:
- Go to Settings → Account Settings
- Select the account
- Edit Service Configuration
-
Choose approach:
- Allow all services
- Select specific services
- Save configuration
See Account Settings workflow for detailed configuration.
CloudFormation Stack Details¶
Stack Resources Created¶
The onboarding CloudFormation stack creates:
IAM Role: tagops-exec-account-role (or custom name)
Trust Policy: Allows TagOps to assume the role
Managed Policies: - Resource tagging permissions - Resource read permissions - CloudTrail read permissions
Required Permissions¶
The IAM role grants permissions for:
Resource Discovery: - List and describe resources - Read resource configurations - Get resource tags
Tagging Operations: - Create tags - Update tags - Delete tags
CloudTrail Access (optional but recommended): - Read trail configurations - Verify trail status
Stack Parameters¶
Parameters:
RoleName: tagops-exec-account-role
ExternalId: [generated random string]
Outputs:
RoleArn: arn:aws:iam::ACCOUNT_ID:role/tagops-exec-account-role