On occasions when a Partner admin has configured an AWS account at the Customer tenant rather than at the Partner tenant, the External IDs presented by CloudHealth for use within the IAM Role Trust permission will be different and could cause the IAM role to be rejected if used elsewhere. This occurs because there is a mismatch between the External ID of the AWS account and the External ID configured at the AWS IAM Role.
AWS adjusted the way that security, and specifically External IDs are treated, which has led to an update to how CloudHealth configures accounts in the platform.
How to Use an External ID When Granting Access to Your AWS Resources to a Third Party
CloudHealth automatically generates a unique External ID for each tenant, when an AWS account is configured within that tenant, CloudHealth will automatically assign that tenant's External ID:
There will be the ability to sync External IDs between the tenant.
If both External IDs are required in the IAM Role Trust, then an array can be created to contain both External IDs: