Initial Setup
After CloudKeeper onboards your organization, follow these steps to complete your initial configuration.
Step 1: Log In as Customer Admin
- Navigate to your organization's Prism URL:
https://yourcompany.prism.cloudkeeper.com/init - Set up your password and configure MFA
- You'll see the Application Selection screen — click Admin Portal
- You'll be taken to the Admin Portal dashboard
The /init path is specifically for intial admin login. SSO users access Prism through SSO on the root URL.
Step 2: Set Up Identity Provider (Recommended)
Configure an identity provider so your users can log in with their existing corporate credentials:
- Navigate to Preferences > Identity Providers in the sidebar
- Click Add Identity Provider
- Choose your provider:
- Google OAuth — For Google Workspace organizations
- Microsoft OAuth — For Microsoft 365 / Azure AD organizations
- Custom OIDC — For other OpenID Connect providers
- Follow the provider-specific setup instructions
See Identity Providers for detailed configuration guides.
Step 3: Create Users
Create user accounts for your team members:
- Navigate to Users in the sidebar
- Click Create User
- Fill in the user details:
- Username (required) — Must be unique
- Email (required) — Must be unique
- First Name and Last Name (required)
- Click Create
See Create User for details.
If you configured SCIM provisioning, users are synchronized automatically from your identity provider. See SCIM Configuration.
Step 4: Create Groups
Organize users into groups for easier permission management:
- Navigate to Groups in the sidebar
- Click Create Group
- Enter a group name
- Click Create
- Add users to the group
See Groups for details.
Step 5: Onboard AWS Accounts
Add your AWS accounts to Prism:
- Navigate to Accounts in the sidebar
- Follow the onboarding wizard to add your organization's AWS accounts
- Assign account owners who will approve JIT access requests
See Onboard Account for the full walkthrough.
Step 6: Create Permission Sets
Define what level of access users will have:
- Navigate to Permission Sets in the sidebar
- Click Create Permission Set
- Enter a name and optional description
- Set the session duration
- Add AWS managed policies (e.g.,
ReadOnlyAccess,PowerUserAccess) and/or write custom inline policies - Click Create
See Permission Sets for details.
Step 7: Create Assignments
Grant users or groups access to AWS accounts:
- Navigate to Assignments in the sidebar
- Either:
- Select one or more accounts using the checkboxes and click the + Assign button at the top, or
- Click on an account to open its detail view, then click Assign users or groups
- Select the users or groups and the permission sets to assign
- Confirm the assignment. Assignments are eventually consistent and may take a few seconds to propagate.
See Assignments for details.
Step 8: Replicate Configuration
Synchronize your IAM Identity Center configuration to Prism:
- Navigate to Preferences > Replication in the sidebar
- Configure the management acccount of your AWS Organization and Run Full Replication to synchronize everything
- Wait for the replication to complete
See Replication for details.
Verification
After completing the initial setup:
- Identity provider is configured and users can log in via SSO
- Users and groups are created
- AWS accounts are onboarded with owners assigned
- Permission sets are defined
- Assignments are created
- Replication has completed successfully
Next Steps
- First Login — Share login instructions with your team
- Quick Start: Admin — Walk through the admin workflow in detail