View a markdown version of this page

Mapping Partner Central Users to Managed Policies - AWS Partner Central

Mapping Partner Central Users to Managed Policies

Understanding Partner Central Personas and Policy Mapping

Each persona represents a distinct role within your partner organization with specific access needs to AWS Partner Central features. Match your users to these personas to assign the appropriate managed policy that grants necessary permissions while maintaining security best practices.

Important

All managed policies below grant users access to Amazon Q, an AI-powered assistant providing real-time support and guidance within AWS Partner Central. For more information on Amazon Q, see here.

Common AWS Partner Central User Personas

User persona Persona Description Recommended Partner Central Managed policies Partner Central responsibilities
IAM Administrator This individual typically sits in IT Security, Information Security, or Governance/Compliance teams, but this varies by organization. They should have administrator access to the AWS account used to access AWS Partner Central. This individual should have administrator rights within the AWS account in order to provision users' IAM permissions
  • Collaborate with alliance lead/users to understand level of access required

  • Onboard users to AWS IAM and provision access

  • Audit user access

  • Set up single sign-on to streamline access

Alliance Lead (Head of AWS Partnership, Director of Cloud Alliances) Owns the AWS relationship and is responsible for driving growth of the AWS partnership through program alignment, co-sell readiness and cross-functional execution
  • AWSPartnerCentralFullAccess

  • AWSMarketplaceFullAccess

These policies combined provision these users with full read and write access to all features in AWS Partner Central. For a detailed breakdown of what this policy contains, see here.

  • Manages ACE co-sell pipeline

  • Submits and tracks program applications

  • Oversees partner progress via the Scorecard and benefits eligibility

  • Approves MP listings, funding and program applications, solutions and marketing assets

  • Manages company profile

  • Defines user permissions requires and collaborates with IAM Administrator to provision access in IAM

Program Coordinator (Partner Operations Manager, Alliance Team Member, APN Program Administrator) Collaborates closely with Alliance Lead to distribute oversight responsibilities by supporting tracking of requirements, management of submissions and ensuring compliance.
  • AWSPartnerCentralFullAccess

  • AWSMarketplaceFullAccess

These users are essentially an extension of the Alliance Lead and require similar permissions. These policies combined provisions these users with full read and write access to all features in AWS Partner Central. For a detailed breakdown of what this policy contains, see here.

  • Tracks certifications, scorecard metrics and program deadlines

  • Submits documentation for programs, listings, solutions and funding

  • Coordinates across teams to gather and submit inputs

  • Handles operational issues

Marketing Manager (Partner Marketing Manager, Channel Marketing Lead) The Marketing Manager builds awareness and drives demand for AWS-aligned offerings. They develop campaigns, create content, and apply for joint marketing programs.
  • AWSPartnerCentralMarketingManager

  • AWSPartnerCentralBenefitIncentive (only applicable if this persona is also responsible for managing funding programs/allocation)

  • Create and list solutions and products on the AWS Marketplace

  • Create case studies

  • Manage campaigns

  • Manage funding such as Market Development Funds (MDF)

Sales Manager (Account Manager, Account Executive, Business Development Manager) Accelerate revenue by sourcing, registering and closing AWS-related deals in collaboration with AWS field teams.

AWSPartnerCentralOpportunityManagement

This policy grants users the ability to view and edit the entire pipeline of opportunities within your AWS Partner Central account. This policy is designed for team members who are actively working on partner opportunities and need access to opportunity management features, but don't require access to all Partner Central capabilities. This policy also provides access to other general purpose features, like the ability to access partner documentation, contact support, and track progress with the Scorecard.

  • Registers co-sell opportunities

  • Accepts and manages AWS-referred leads

  • Maintains co-sell opportunity hygiene

  • Views pipeline metrics and reports on opportunity status and progress

Integration Engineer/Developer Technical user supporting the partner alliances team with building and maintaining CRM integrations connecting partner systems to AWS Partner Central APIs AWSFullAccessSandboxFullAccess
  • Design and implement integrations

Technical Lead The Technical Lead is the engineer or architect who ensures their organization's solutions meet AWS technical standards and program requirements. They design and implement scalable cloud architectures, provide technical guidance across teams, and optimize solutions for performance, security, and cost.
  • AWSPartnerCentralFullAccess

  • AWSMarketplaceSellerProduct

  • Create solutions and submit Foundational Technical Reviews

  • Apply for programs or specializations and support with technical supporting documentation

  • Access to AWS technical documentation and enablement not available publicly

Funding Program Manager The Funding Program Manager owns financial operations tied to AWS—tracking revenue, reconciling payments, and managing funding audits and reporting.

PartnerCentralIncentiveBenefitManagement

This policy provides access to manage incentive and benefit programs within AWS Partner Central.

  • Create new fund requests

  • Manage claims processes

  • View and manage all historical fund requests

AWS ProServe Tools Access

For services partners supporting customer migrations and who want access to the AWS Assessment Tools (outside of AWS Partner Central), users must be assigned one of three managed policies to be provisioned access. These tools include:

  • Migration Portfolio Assessment (MPA): A tool that helps partners and customers evaluate, plan, and prioritize workloads for migration to AWS. MPA enables partners to build a business case for migration, analyze the current application portfolio, estimate costs, and identify the right migration strategy for each workload. It provides data-driven insights to accelerate migration planning and reduce risk.

  • Assessment Tools (A2T): A suite of customer-facing survey and assessment tools, including the Migration Readiness Assessment (MRA) — a structured evaluation that measures a customer's readiness to migrate to AWS across six dimensions of the AWS Cloud Adoption Framework. A2T assessments help partners identify gaps, build remediation plans, and demonstrate migration readiness to AWS and the customer.

Access is controlled through three AWS managed policies, each mapped to a specific user persona. Use the table below to determine the level of access each individual requires:

User persona Persona Description Recommended Partner Central Managed policies AWS Assessment Tools functionality
Individual Contributor This individual creates and manages their own assessments in A2T and MPA. This is the base-level role required for all assessment activity. AWSPartnerProServeToolsIndividualContributor
  • Create, read, update, and share only their own assessments/portfolios in both A2T and MPA

Organization Reader and Individual Contributor This individual requires visibility into all assessments across the organization, while also managing their own. This persona is common for team leads or senior practitioners who need to review historical or peer assessments without editing them. AWSPartnerProServeToolsOrganizationReaderIndividualContributor
  • Read all organizational assessments in A2T (read-only for others' work)

  • Create, read, update, and share only their own assessments/portfolios in both A2T and MPA

Organization Contributor (Full Assessment Access) This individual requires full read/write access to all assessments in the organization. This persona is suited for senior practitioners or delivery leads who need to edit, delete, or share assessments created by any user in the organization, including historical assessments. AWSPartnerProServeToolsFullAccess
  • Create, edit, delete, and share any A2T assessments/MPA portfolios in the organization

  • Access to all historical A2T assessments/MPA portfolios created prior to partner migration to AWS Console

For more information about IAM managed policies, see Managing IAM policies. For information about attaching policies to users and groups, see Attaching a policy to an IAM user group.