Skip to content

SSO Admin

CloudMock emulates AWS IAM Identity Center (SSO) Admin, supporting instances, permission sets, account assignments, managed policies, inline policies, and tagging.

OperationStatusNotes
CreateInstanceSupportedCreates a new SSO instance
ListInstancesSupportedLists SSO instances
DescribeInstanceSupportedReturns instance details
ProvisionPermissionSetSupportedTriggers permission set provisioning (async no-op in mock)
CreatePermissionSetSupportedCreates a permission set
DescribePermissionSetSupportedReturns permission set details
ListPermissionSetsSupportedLists permission sets
UpdatePermissionSetSupportedUpdates a permission set
DeletePermissionSetSupportedDeletes a permission set
CreateAccountAssignmentSupportedCreates an account assignment
ListAccountAssignmentsSupportedLists account assignments
DeleteAccountAssignmentSupportedDeletes an account assignment
AttachManagedPolicyToPermissionSetSupportedAttaches a managed policy
DetachManagedPolicyFromPermissionSetSupportedDetaches a managed policy
ListManagedPoliciesInPermissionSetSupportedLists managed policies
PutInlinePolicyToPermissionSetSupportedSets an inline policy
GetInlinePolicyForPermissionSetSupportedReturns the inline policy
DeleteInlinePolicyFromPermissionSetSupportedRemoves the inline policy
TagResourceSupportedAdds tags to a resource
UntagResourceSupportedRemoves tags from a resource
ListTagsForResourceSupportedLists tags for a resource
import { SSOAdminClient, CreatePermissionSetCommand } from '@aws-sdk/client-sso-admin';
const client = new SSOAdminClient({
endpoint: 'http://localhost:4566',
region: 'us-east-1',
credentials: { accessKeyId: 'test', secretAccessKey: 'test' },
});
const { PermissionSet } = await client.send(new CreatePermissionSetCommand({
InstanceArn: 'arn:aws:sso:::instance/ssoins-1234567890',
Name: 'AdminAccess',
SessionDuration: 'PT8H',
}));
console.log(PermissionSet.PermissionSetArn);
import boto3
client = boto3.client('sso-admin',
endpoint_url='http://localhost:4566',
region_name='us-east-1',
aws_access_key_id='test',
aws_secret_access_key='test')
response = client.create_permission_set(
InstanceArn='arn:aws:sso:::instance/ssoins-1234567890',
Name='AdminAccess',
SessionDuration='PT8H')
print(response['PermissionSet']['PermissionSetArn'])
cloudmock.yml
services:
ssoadmin:
enabled: true
  • SSO instances are stubs and do not provide actual SSO functionality
  • Account assignments are stored but do not grant real access
  • Permission sets are not provisioned to accounts