Controlling access in AWS Partner Central
User access to AWS Partner Central is managed through AWS Identity and Access Management (IAM). IAM permissions control who can be authenticated (signed in) and authorized (have permissions) to use AWS Partner Central and AWS Marketplace features. IAM is an AWS service that you can use at no additional charge.
IAM permissions are assigned to individual users by IAM Administrators. These administrators act as security managers for your AWS environment—they provision and de-provision user accounts, assign permissions, and set up security policies. IAM Administrators typically sit within IT or Governance and Security teams.
Important
To access AWS Partner Central, users must work with their IAM Administrator to be provided with the correct level of access. If permissions aren't set up correctly, users might not be able to sign in at all, or they might be able to log in, but may not be able to access the tools and information they need to do their job.
The following resources provide more information about getting started and using IAM:
Topics
AWS IAM for AWS Partner Central
AWS IAM is built on the concept of role-based access. Within this framework, users are assigned to specific roles or groups associated with a set of IAM policies that control what specific features within AWS Partner Central that a user can access. To simplify this process, AWS has published several Managed policies to simplify user management for common user personas within AWS Partner Central.
The IAM Administrator is responsible for the creation of IAM roles, groups and policies and assignment of users to provision permissions in AWS IAM, but must collaborate with the Partner Central users and their leadership to determine what level of access each user should be granted.
Review the Managed policy mappings for guidance on managed policy assignments based on common Partner Central user personas.
Working with AWS IAM requires specific technical knowledge and appropriate AWS account permissions. These individuals ('IAM Administrators') are required to support set up and management of these permissions. The IAM Administrator is typically someone in your IT Security, Information Security, or Governance/Compliance department.
Partner Central uses AWS IAM to manage all user access through your organization's AWS account. Instead of Partner Central managing users directly, your IT team controls access through AWS IAM. Users are assigned specific policies that determine which Partner Central resources (like Opportunities, Solutions, or Fund Requests) a user can access and whether they can only view information (read access) or also make changes (write access).
Important
If users are not properly provisioned access in IAM, they will not be able to access features in AWS Partner Central. Users should only have access to the features they need to do their job - this is called "least privilege" access.
IAM Role-Based Access Implementation
Implementation varies by organization but generally follows this process:
- Step 1: The IAM Administrator creates IAM roles
-
IAM Administrators create roles that define functional personas within AWS Partner Central. Each role describes the specific features and capabilities users in that job function need to access. For example, a role could be created for:
-
Marketing Managers, responsible for creating co-marketing assets and managing campaigns
-
Operations Administrators, responsible for creating and managing fund requests.
Organizations can create as many roles as needed based on the different personas accessing Partner Central. For a summary of common Partner Central user personas, see here. In addition to these managed policies, organizations can create and customize managed policies to tailor access as needed. For more information, see AWS managed policies for AWS Partner Central users.
Note
Not sure who your IAM Administrator is? They typically sit in IT Security, Information Security, or Governance/Compliance teams, but this varies by organization. They should have administrator access to the AWS account used to access AWS Partner Central.
-
- Step 2: Assign IAM Policies to Each Role
-
Once roles are created, the IAM Administrator assigns specific IAM policies that determine allowed access. For example, the Marketing Manager role might receive read/write access to the Case Studies feature, permission to create and manage Solutions, and the ability to create tickets to APN Support. To simplify this process, AWS publishes Managed Policies—pre-built sets of IAM policies that map to common user roles. Instead of provisioning individual feature-level inline policies, IAM Administrators can assign Managed Policies that align with each role's responsibilities. To see how common Partner Central personas map to published Managed Policies, see here.
Note
IAM Administrators can use managed policies or build custom policies for specific user permissions. AWS recommends using managed policies when possible to simplify permission management, as they enable automatic AWS updates for common use cases and version control.
- Step 3: [Optional] Set up Single Sign-On
-
Single Sign-On (SSO) benefits users, organizations, and IT teams by streamlining authentication and enhancing security. For users, SSO simplifies access by allowing them to log in once, with a single set of credentials, to access multiple enterprise applications, reducing password fatigue and enabling faster productivity through seamless navigation across integrated systems. For organizations, SSO enhances security through centralized authentication that enables stronger access controls and improves compliance by making it easier to enforce security policies. For IT teams specifically, SSO simplifies administration by managing user identities and permissions from a single location, accelerates onboarding and offboarding by granting or revoking access to multiple systems simultaneously, and offers integration flexibility by connecting diverse applications through standard protocols. For more information on how to set up SSO for your organization, see here.
Adding users to AWS Partner Central
Adding users to Partner Central requires coordination between the Alliance Lead (who determines access needs) and the IAM Administrator (who implements the technical setup).
Note
IAM permissions can be modified whenever needed, and there's no cap on how many users can receive access rights.
To add a new user:
For Alliance Leads: Determine User Access Needs
-
Identify the user's role and required access level: Review the managed policy mappings to determine which role (persona) best describes their job function. Refer to this table for common Partner Central user personas and which Managed policies best fit that user's required level of access.
-
Request the IAM Administrator to add the user. Provide the IAM Administrator with:
-
User's name and company email address
-
Required managed policies (e.g., AWSPartnerCentralOpportunityManagement)
-
Any specific access requirements if custom policies are needed
-
For IAM Administrators: Create and Configure User Access
Depending on your AWS account setup, choose one of the following options to grant users access:
- Option 1: Using IAM Identity Center
-
Best for: Organizations managing multiple users across AWS accounts who want centralized access management with single sign-on (SSO) capabilities.
Key benefits: Centralized user management, automatic permission synchronization across accounts, simplified onboarding/offboarding, and enhanced security with SSO.
- Option 2: Using IAM Console (For individual users)
-
Best for: Small teams or organizations managing a limited number of individual user accounts who need direct AWS Console access.
Key benefits: Quick setup for individual users, direct control over specific user permissions, and straightforward for small-scale deployments.
- Option 3: Integrate with a third-party Identity Provider
-
Best for: Organizations already using enterprise identity providers (like Okta, Azure AD, or Ping Identity) who want to maintain existing authentication workflows.
Key benefits: Seamless integration with existing enterprise identity systems, consistent authentication experience across all business applications, centralized user lifecycle management, and enhanced compliance with corporate security policies.
Permissions for AWS Partner Central
You can use the following permissions in IAM policies for AWS Partner Central. You can combine permissions into a single IAM policy to grant the permissions you want.
ListPartnerPaths
ListPartnerPaths provides access to list partner paths in AWS Partner Central.
-
Action groups:
ListOnly,ReadOnly,ReadWrite -
Required resources: Does not support specifying a resource Amazon Resource Number (ARN) in the
Resourceelement of an IAM policy statement. To allow access, specify"Resource": "*"in your policy.
EnrollInPartnerPath
EnrollInPartnerPath provides access to enroll in partner paths in AWS Partner Central.
-
Action groups:
ReadWrite -
Required resources: Does not support specifying a resource Amazon Resource Number (ARN) in the
Resourceelement of an IAM policy statement. To allow access, specify"Resource": "*"in your policy.
GetPartnerDashboard
GetPartnerDashboard provides access to retrieve partner dashboard information in AWS Partner Central.
-
Action groups:
ReadOnly,ReadWrite -
Required resources:
arn:${Partition}:partnercentral::${Account}:catalog/${Catalog}/ReportingData/${TableId}/Dashboard/${DashboardId} -
Condition keys:
partnercentral:Catalog
CreateBusinessPlan
CreateBusinessPlan provides access to create business plans in AWS Partner Central.
-
Action groups:
ReadWrite -
Required resources: Does not support specifying a resource Amazon Resource Number (ARN) in the
Resourceelement of an IAM policy statement. To allow access, specify"Resource": "*"in your policy.
PutBusinessPlan
PutBusinessPlan provides access to update business plans in AWS Partner Central.
-
Action groups:
ReadWrite -
Required resources: Does not support specifying a resource Amazon Resource Number (ARN) in the
Resourceelement of an IAM policy statement. To allow access, specify"Resource": "*"in your policy.
ListBusinessPlans
ListBusinessPlans provides access to list business plans in AWS Partner Central.
-
Action groups:
ListOnly,ReadOnly,ReadWrite -
Required resources: Does not support specifying a resource Amazon Resource Number (ARN) in the
Resourceelement of an IAM policy statement. To allow access, specify"Resource": "*"in your policy.
GetBusinessPlan
GetBusinessPlan provides access to retrieve business plan details in AWS Partner Central.
-
Action groups:
ReadOnly,ReadWrite -
Required resources: Does not support specifying a resource Amazon Resource Number (ARN) in the
Resourceelement of an IAM policy statement. To allow access, specify"Resource": "*"in your policy.
CreateCollaborationChannelRequest
CreateCollaborationChannelRequest provides access to create collaboration channel requests in AWS Partner Central.
-
Action groups:
ReadWrite -
Required resources: Does not support specifying a resource Amazon Resource Number (ARN) in the
Resourceelement of an IAM policy statement. To allow access, specify"Resource": "*"in your policy.
ListCollaborationChannels
ListCollaborationChannels provides access to list collaboration channels in AWS Partner Central.
-
Action groups:
ListOnly,ReadOnly,ReadWrite -
Required resources: Does not support specifying a resource Amazon Resource Number (ARN) in the
Resourceelement of an IAM policy statement. To allow access, specify"Resource": "*"in your policy.
GetCollaborationChannel
GetCollaborationChannel provides access to retrieve collaboration channel details in AWS Partner Central.
-
Action groups:
ReadOnly,ReadWrite -
Required resources: Does not support specifying a resource Amazon Resource Number (ARN) in the
Resourceelement of an IAM policy statement. To allow access, specify"Resource": "*"in your policy.
CreateCollaborationChannelMembers
CreateCollaborationChannelMembers provides access to create collaboration channel members in AWS Partner Central.
-
Action groups:
ReadWrite -
Required resources: Does not support specifying a resource Amazon Resource Number (ARN) in the
Resourceelement of an IAM policy statement. To allow access, specify"Resource": "*"in your policy.
SearchPartnerProfiles
SearchPartnerProfiles provides access to search public partner profiles in AWS Partner Central.
-
Action groups:
ListOnly,ReadOnly,ReadWrite -
Required resources: Does not support specifying a resource Amazon Resource Number (ARN) in the
Resourceelement of an IAM policy statement. To allow access, specify"Resource": "*"in your policy.
GetPartnerProfile
GetPartnerProfile provides access to retrieve public partner profile details in AWS Partner Central.
-
Action groups:
ReadOnly,ReadWrite -
Required resources: Does not support specifying a resource Amazon Resource Number (ARN) in the
Resourceelement of an IAM policy statement. To allow access, specify"Resource": "*"in your policy.
GetProgramManagementAccount
GetProgramManagementAccount provides access to retrieve program management account details in AWS Partner Central.
-
Action groups:
ReadOnly,ReadWrite -
Required resources: Does not support specifying a resource Amazon Resource Number (ARN) in the
Resourceelement of an IAM policy statement. To allow access, specify"Resource": "*"in your policy. -
Condition keys:
partnercentral:Catalog
UseSession
UseSession provides access to use Partner Central agents sessions in AWS Partner Central.
-
Action groups:
ReadWrite -
Required resources: Does not support specifying a resource Amazon Resource Number (ARN) in the
Resourceelement of an IAM policy statement. To allow access, specify"Resource": "*"in your policy. -
Condition keys:
partnercentral:Catalog
Condition keys for AWS Partner Central
AWS Partner Central defines the following condition keys that you can use in the Condition element of an IAM policy.
partnercentral:Catalog
Filters access by a specific Catalog.
-
Type:
StringValid values:
[AWS | Sandbox]
partnercentral:RelatedEntityType
Filters access by entity types for Opportunity association.
-
Type:
StringValid values:
[Solutions | AwsProducts | AwsMarketplaceOffers]
partnercentral:ChannelHandshakeType
Filters access by channel handshake types.
-
Type:
StringValid values:
[START_SERVICE_PERIOD | REVOKE_SERVICE_PERIOD | PROGRAM_MANAGEMENT_ACCOUNT]
partnercentral:VerificationType
Filters access by the type of verification being performed.
-
Type:
StringValid values:
[BUSINESS_VERIFICATION | REGISTRANT_VERIFICATION]
partnercentral:FulfillmentTypes
Filters access by benefit fulfillment types.
-
Type:
ArrayOfStringValid values:
[CREDITS | CASH | ACCESS]
partnercentral:Programs
Filters access by program.
-
Type:
ArrayOfString