Linking AWS Partner Central accounts with AWS Marketplace seller accounts
AWS Partners with AWS Marketplace seller accounts can connect their accounts using the Account Linking feature in AWS Partner Central. Connecting the AWS Partner Central account to an AWS Marketplace account and mapping user permissions across portals allows users to seamlessly access both accounts through single sign-on access, enables product-to-solution linking, ACE opportunities to marketplace private offers linking, and access to AWS Marketplace seller insights dashboards within Partner analytics in AWS Partner Central.
To enable account linking, assign user roles in AWS Partner Central, including the cloud admin role. If a cloud admin role is not assigned, the alliance lead user can link AWS Partner Central and AWS Marketplace accounts. For more information about AWS Marketplace, refer to the AWS Marketplace Seller Guide.
Important
To enable ACE opportunity connections to Marketplace private offers, users must be mapped to an IAM role in the connected AWS marketplace seller account. For more information, refer to Linking your AWS Partner Central account to an AWS Marketplace account.
Note
Browser compatibility requirements: Firefox Extended Support Release (Firefox ESR) isn't supported. If you have UI issues related to Firefox ESR while using AWS Partner Central, use a standard version of Firefox or switch to a Chromium-based browser.
Prerequisites
To link your AWS Marketplace seller account with an AWS Partner Central account, you must have access to an AWS account with IAM permissions. Follow these steps to create a custom permissions policy and assign the policy to an existing IAM user or role. If you already have an IAM user or role with AWS administrator permissions, you may skip these steps and start with Linking your AWS Partner Central account to an AWS Marketplace account.
To create the custom permissions policy:
Sign in to the IAM console
. Under Access management, choose Policies.
Choose Create policy.
Specify permissions in the policy editor by choosing JSON, and then add the following policy:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "CreatePartnerCentralRoles", "Effect": "Allow", "Action": [ "iam:CreateRole" ], "Resource": [ "arn:aws:iam::*:role/PartnerCentralRoleForCloudAdmin*", "arn:aws:iam::*:role/PartnerCentralRoleForAce*", "arn:aws:iam::*:role/PartnerCentralRoleForAlliance*" ] }, { "Sid": "AttachPolicyToPartnerCentralCloudAdminRole", "Effect": "Allow", "Action": "iam:AttachRolePolicy", "Resource": "arn:aws:iam::*:role/PartnerCentralRoleForCloudAdmin*", "Condition": { "ArnLike": { "iam:PolicyARN": [ "arn:aws:iam::*:policy/PartnerCentralAccountManagementUserRoleAssociation", "arn:aws:iam::*:policy/AWSPartnerCentralFullAccess", "arn:aws:iam::*:policy/AWSMarketplaceSellerFullAccess" ] } } }, { "Sid": "AttachPolicyToPartnerCentralAceRole", "Effect": "Allow", "Action": [ "iam:AttachRolePolicy" ], "Resource": "arn:aws:iam::*:role/PartnerCentralRoleForAce*", "Condition": { "ArnLike": { "iam:PolicyARN": [ "arn:aws:iam::*:policy/AWSPartnerCentralOpportunityManagement", "arn:aws:iam::*:policy/AWSMarketplaceSellerOfferManagement" ] } } }, { "Sid": "AttachPolicyToPartnerCentralAllianceRole", "Effect": "Allow", "Action": [ "iam:AttachRolePolicy" ], "Resource": "arn:aws:iam::*:role/PartnerCentralRoleForAlliance*", "Condition": { "ArnLike": { "iam:PolicyARN": [ "arn:aws:iam::*:policy/AWSPartnerCentralFullAccess", "arn:aws:iam::*:policy/AWSMarketplaceSellerFullAccess" ] } } }, { "Sid": "AssociatePartnerAccount", "Effect": "Allow", "Action": [ "partnercentral-account-management:AssociatePartnerAccount" ], "Resource": "*" }, { "Sid": "SellerRegistration", "Effect": "Allow", "Action": [ "aws-marketplace:ListChangeSets", "aws-marketplace:DescribeChangeSet", "aws-marketplace:StartChangeSet", "aws-marketplace:ListEntities", "aws-marketplace:DescribeEntity" ], "Resource": "*" } ] }
Choose Next.
Under Policy details, enter
PartnerAccountManagement
(suggested name) for Policy name and add an optional description.Review the policy permissions.
(Optional) Add tags as needed.
Choose Create policy.
Next, assign this custom inline policy to your existing IAM user or role using the steps from Adding IAM identity permissions (console).
Linking your AWS Partner Central account to an AWS Marketplace account
Recommendation: Upon completion of the prerequisites
above, follow the instructions below or reference the latest Account Linking User Guide
Sign in to AWS Partner Central
as a user with an Alliance lead or cloud admin role. In the AWS Marketplace section of the AWS Partner Central home page, choose Link Account.
On the AWS Marketplace Account linking page, choose Link Account.
On the AWS account sign-in page, choose IAM user.
Enter the AWS account ID for the AWS account associated with your AWS Marketplace seller profile and sign in.
-
Navigate through the three step self-service linking experience:
-
Step 1: Review the AWS account ID and the associated AWS Marketplace Seller profile legal name and click Next.
-
If your AWS account is not registered as a seller, provide your legal business name to be registered on AWS Marketplace.
-
Step 2: Review the IAM roles (CloudAdmin, Alliance, and ACE) that will be created in your AWS account, including the managed policies attached to them, and click Next.
-
(Optional) If you want to bulk map the IAM roles to the Partner users with Alliance team and ACE partner roles, you can select the checkbox under each role section to map to the partner user
-
A partner user cannot access AWS Marketplace features such as linking private offers to ACE opportunities without an IAM role mapped to their partner user account. If you choose not to bulk assign, you will need to manually map an IAM role to a partner user after linking the accounts.
-
Step 3: Review the information and proceed by clicking Submit.
-
-
You are directed to to AWS Partner Central with your account successfully linked and the default IAM roles created in your account.
To provide access to AWS Marketplace features within AWS Partner Central, proceed to Mapping AWS Partner Central users to AWS Marketplace IAM roles.