Configure AWS Accounts
WatchTower supports two types of accounts:- Stand-Alone Accounts - Manually added individual accounts
- Inventoried Accounts - Automatically discovered from AWS Organizations
Adding a Stand-Alone Account
- Navigate to Accounts and click Add Account
- Complete the 3-step wizard:
Step 1: Account Information
- Account ID (required) - AWS account ID (12-digit number)
- Account Name (required) - Friendly display name
- Organization (optional) - Associate with an organization
- Description - Additional account details
- Email - Contact email for this account
- Status - Account status (ACTIVE, SUSPENDED, etc.)
Step 2: Inventory Role Configuration
Configure how WatchTower accesses the account: Direct Role (recommended)- Target Role ARN - IAM role ARN (e.g.,
arn:aws:iam::123456789012:role/WatchTowerRole
) - External ID - External ID for secure role assumption
- Session Name (optional) - Identifier for CloudTrail logs
- Requires both intermediate and target role configuration
Leave role fields empty to create a reference-only account. Inventory access can be added later.
Step 3: Metadata
Optional: Add custom metadata and attributesViewing Accounts
Navigate to Accounts > List to see all configured accounts. The list shows:- Account statistics (All, Suspended, Individual, Customized)
- Search by account name, ID, or organization
- Account type indicators:
- List - Reference only, no access
- Read - Inventory role configured, read-only access
- Access - Custom access roles configured
- Inventory - Discovered from organization
- Customized - Inventoried account with custom modifications
Editing Accounts
- Navigate to Accounts > List
- Click Edit next to the account
Stand-Alone Accounts (Full Edit)
You can modify:- All account information
- Inventory role configuration
- Account access roles
Inventoried Accounts (Limited Edit)
- Read-Only: Basic information (sourced from AWS)
- Editable: Inventory role configuration
- Editable: Account access roles (for customization)
Understanding Account Types
Stand-Alone Accounts
Manually added accounts with full edit and delete capabilities. List Account:- Reference only, basic metadata tracked
- No inventory or access configured
- Use for documentation purposes
- Inventory role configured
- Read-only access to collect resource information
- Cannot execute actions in the account
- Custom access roles configured
- Full management capabilities based on role permissions
- Use for automation and management tasks
Inventoried Accounts
Automatically discovered from AWS Organizations. Characteristics:- Auto-discovered and updated
- Basic information is read-only
- Can add custom access roles
- Cannot be deleted directly
- Add account-specific access roles
- Configure inventory role for direct access
- Override organization-level settings
Account Access Roles
Configure account-specific role mappings that override organization-level roles. When to use:- Account needs different access than organization defaults
- Stand-alone accounts requiring specific automation roles
- Customizing access for particular accounts in an organization
Deleting Accounts
- Navigate to Accounts > List > View
- Click Delete Account (only available for stand-alone accounts)
- Confirm deletion
Only stand-alone accounts can be deleted. Inventoried accounts are managed through their parent organization. This action cannot be undone.
Role Assumption
Quickly assume configured roles directly from the accounts list:- Click the Assume Role icon (swap icon) next to any account
- Select the role you want to assume
- WatchTower opens the AWS console with the assumed role
Best Practices
Organization vs Stand-Alone:- Use organizations for AWS Organization accounts (automatic discovery)
- Use stand-alone accounts for:
- Individual AWS accounts not in an organization
- Development/test accounts
- Accounts requiring special handling
- Always use External IDs for role assumption
- Use descriptive session names for audit trails
- Test role assumption before relying on access
- Use organization-level roles for consistency
- Override at account level only when needed
- Document customizations for future reference
- Review suspended accounts periodically
- Remove or update inactive stand-alone accounts
- Keep contact information current