Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

5.1.3. Troubleshooting Authentication Issues

First Principle: Authentication failures produce specific, diagnosable error patterns. Systematic troubleshooting starts with identifying the authentication mechanism, checking the error message, and working through the common failure causes for that mechanism.

Common Authentication Failures:
SymptomLikely CauseDiagnostic
"Access Denied" after federationPermission set doesn't cover the actionCheck Identity Center permission sets
MFA token rejectedClock drift between device and AWSResync MFA device in IAM console
Cognito sign-in failsUser pool configuration (password policy, required attributes)Check Cognito user pool settings
Cross-account AssumeRole failsTrust policy doesn't include the calling account/roleCheck role trust policy in target account
STS token expiredSession duration too short or token not refreshedExtend max session duration, refresh token
CloudTrail for Authentication Troubleshooting:
  • Every authentication event is logged in CloudTrail
  • Failed AssumeRole calls show the error reason
  • Failed console logins appear as ConsoleLogin events with errorMessage
  • Filter by errorCode: "AccessDenied" to find all auth failures
Identity Center Troubleshooting:
  • Verify the identity source connection (AD Connector health, SAML metadata)
  • Check permission set assignments (user → group → permission set → account)
  • Verify the permission set's IAM policy matches the required actions
  • Check AWSServiceRoleForSSO exists in target accounts
AWS Directory Service Troubleshooting:
  • AD Connector requires network connectivity to on-premises AD (VPN or Direct Connect)
  • DNS resolution must work for AD domain
  • Service account credentials must be valid and not expired
  • Security group must allow AD-related ports (LDAP 389, LDAPS 636, Kerberos 88)

⚠️ Exam Trap: The most common cause of federation failures is a misconfigured trust policy — the target role doesn't trust the IdP or the calling principal. Always check trust policies first when cross-account or federated access fails.

Scenario: Developers report they can't access a specific AWS account through Identity Center. You check CloudTrail and find AssumeRole failures with errorCode: AccessDenied. The permission set is assigned correctly, but the IAM role's trust policy in the target account was manually modified and no longer trusts the Identity Center service principal.

Reflection Question: Why is CloudTrail the first tool to check for authentication failures, and what specific event fields help you diagnose the root cause?

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications