Step-by-step guide
Sandbox Account Setup
Goal
Create a new sandbox AWS account under your existing AWS Organization and log in as its administrator.
Prerequisites
- You must have Organizations: Full access permissions in the management (root) account.
- You should already be signed into the AWS Management Console as an IAM Identity Center (SSO) or root user with admin privileges.
Sandbox account creation instructions
Here’s a step-by-step, business-friendly console guide for creating and logging into a new AWS account within an AWS Organization (for sandbox or experimental use):
Step-by-Step Instructions
Open AWS Organizations
- Sign in to your management account.
- In the AWS Console, go to: https://console.aws.amazon.com/organizations
Create a New AWS Account
- In the left panel, select Accounts.
- Choose Add an account → Create an AWS account.
- Fill out the form:
-
Account name:
Sandbox – <TeamName or Purpose>
(e.g., “Sandbox – AI Experiments”) -
Email address: Use a unique alias
(e.g., sandbox+ai@yourcompany.com). -
IAM role name (optional): Keep the default
OrganizationAccountAccessRoleunless your org uses a custom naming policy.
- Click Create AWS account.
It will take a few minutes for AWS to provision the account.
Once done, you’ll see it listed under Accounts → Status: Active.
Assign the Account to the Right OU (Optional)
- From the Accounts page, select the new account.
- Click Move, then choose your Sandbox OU (Organizational Unit).
- This helps apply sandbox-specific SCPs, budgets, or tagging policies automatically.
Log Into the New Account
You have two main options:
Option A — Using AWS IAM Identity Center (recommended)
- Go to your SSO portal: https://.awsapps.com/start.
- Find the Sandbox account.
- Choose the AdministratorAccess role (or equivalent).
- You’ll be redirected to the AWS Console for that account.
Option B — Using the Root Login (for initial setup)
- Go to https://signin.aws.amazon.com/.
- Sign in with the sandbox email address used during creation.
- Click Forgot password to set a new password if needed.
- Once in, enable MFA and update the contact information.
Summary
You’ve now:
- Created a new sandbox account under your Organization
- Logged in securely (via SSO or root)
- Optionally moved it into a Sandbox OU and tagged it for clarity
Now Continue Through the Bootstrap Instructions
Bootstrap instructions for NMD access
In order to build the solution in your environment we will need access to the project sandbox environment. This process usually takes only 10 minutes to complete.
Prerequisite: Sandbox account setup
You will need the following XML file(GoogleIDPMetadata.xml) for step 8 below:
GoogleIDPMetadata.xml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urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
Easy step by step instructions using the AWS Console
- Log in to your AWS account.
- In the AWS Console search for Cloudformation.
- Click on CloudFormation.
- Click Create Stack and With new resources (standard).
- Click Choose an Existing Template, Upload a template file and then upload the main.yaml file you find here: GitHub – New-Math-Data/Bootstrap: Creates an identity provider in a customer account.
- Click Next and type nmd-developer-access-saml in the Stack Name box.
- Type your company name in the the custNameAbbreviation box.
- Paste the entire contents of GoogleIDPMetadata.xml into the samlMetaData box and click Next.
- Under Capabililties, check the box to acknowledge that AWS CloudFormation might create IAM resources with custom names, and then click Next.
- Scroll all the way down and click submit.
At the end of the process you will receive two values. Click on the Outputs tab to see them:
- NewMathDataSsoRole
- NewMathDataIdentityProvider
Please provide those values to us. If you have any questions please let us know and we will be happy to help.