Managing Access Accounts

Access Account

The Aviatrix Platform is a multicloud and multi-accounts platform. The Aviatrix Controller uses your cloud provider API credentials to make API calls, for example, to launch an Aviatrix gateway instance, on behalf of your cloud accounts.

One cloud credential is represented as an Aviatrix access account. The Aviatrix Platform supports multiple Aviatrix accounts. One Aviatrix account can have multiple service accounts from different clouds, one from each cloud. For example, an Aviatrix account name DevOps can have an access account for AWS, Azure ARM credentials, and GCP credentials.

The Aviatrix account structure is shown in the diagram below, where admin is the default user for the primary access account.

account-structure

To add more admin users, refer to Admin Users and Duo Sign in.

Aviatrix Primary Access Account

There is only one primary access account on the Controller. This primary access account is the one you used to launch the Controller through the AWS, Azure, GCP, or OCI marketplaces. For example, if you launched your Controller through the AWS marketplace, your primary access account is an AWS account.

After setting up your primary access account, you can:

  • Launch Aviatrix Gateways in the VPC/VNets that belong to this account.

  • Add access accounts from other Cloud Service Providers. For example, if you launched your Aviatrix Controller through the Azure marketplace, your can add access accounts for AWS, GCP, and OCI.

Aviatrix Access Account Best Practices

An Aviatrix Cloud Account corresponds to one cloud account of one cloud type. You can create multiple Cloud Accounts to support multi cloud and multi account deployment environment.

Setting Up Additional Access Accounts for Different Clouds

After you go through the onboarding process and create the primary access account, you can create additional Aviatrix access accounts on the Controller. This allows you to launch gateways and build connectivity across different cloud accounts. For example, if you create a primary access account in Azure, where you launched your Controller, you can add additional access accounts for AWS, GCP, and OCI.

To launch an additional access account:

  1. Go to your Aviatrix Controller > Accounts > Access Accounts.

  2. Click + Add New to create this new access account.

  3. Enter a unique account name: for example, BU-Group-3.

  4. Mark the radio button for the appropriate Cloud Service Provider. The fields below change based on which Cloud Service Provider you chose. See the following documents for more information on adding access accounts in each cloud:

  5. After entering the information required, scroll down and select any RBAC or permission groups this account should belong to.

  6. Click OK.

  7. The new access account is created.

  8. Now you can create connectivity between two VPC/VNets in different cloud accounts.

Setting Up Additional Access Accounts Using Terraform (AWS)

If you use Terraform to create more AWS access accounts, you need to run the CloudFormation script on each secondary account first, then use Terraform account resource to create the account.

The CloudFormation is necessary to create IAM roles and policies and to establish a trust relationship with the primary account (the account where the Controller is launched.)

Auditing a Cloud Account

To audit a cloud account:

  1. Go to Cloud Resources > Cloud Accounts.

  2. Select the name of the cloud account you wish to audit. The account’s information opens in a panel on the right.

  3. In the panel, click on the More icon (three dots) and select Audit Account.

  4. The Audit Report displays:

    • Status - Pass, Warning, or Fail.

If the audit fails, CoPilot sends out alert email and logs the event. In addition, CoPilot sends an alert email on behalf of any of the above condition failures reported by an account upon the first detection and subsequently every 24 hours until the problem is rectified.
  • Comment - Any comments about the account, especially if the audit failed.

  • Timestamp - The time and date of the audit.

AWS: Viewing and Update Account Policies

For AWS cloud accounts, if the audit status is Warning or Failed, you can review the account’s IAM policy. Exit the Audit Report and review the information in the panel on the right.

  • Click View Policy to view the account’s policy.

  • Click Update to update the account’s IAM policy.