Skip to content

/AWS1/IF_AUM=>DEREGISTERORGADMINACCOUNT()

About DeregisterOrganizationAdminAccount

Removes the specified Amazon Web Services account as a delegated administrator for Audit Manager.

When you remove a delegated administrator from your Audit Manager settings, you continue to have access to the evidence that you previously collected under that account. This is also the case when you deregister a delegated administrator from Organizations. However, Audit Manager stops collecting and attaching evidence to that delegated administrator account moving forward.

Keep in mind the following cleanup task if you use evidence finder:

Before you use your management account to remove a delegated administrator, make sure that the current delegated administrator account signs in to Audit Manager and disables evidence finder first. Disabling evidence finder automatically deletes the event data store that was created in their account when they enabled evidence finder. If this task isn’t completed, the event data store remains in their account. In this case, we recommend that the original delegated administrator goes to CloudTrail Lake and manually deletes the event data store.

This cleanup task is necessary to ensure that you don't end up with multiple event data stores. Audit Manager ignores an unused event data store after you remove or change a delegated administrator account. However, the unused event data store continues to incur storage costs from CloudTrail Lake if you don't delete it.

When you deregister a delegated administrator account for Audit Manager, the data for that account isn’t deleted. If you want to delete resource data for a delegated administrator account, you must perform that task separately before you deregister the account. Either, you can do this in the Audit Manager console. Or, you can use one of the delete API operations that are provided by Audit Manager.

To delete your Audit Manager resource data, see the following instructions:

At this time, Audit Manager doesn't provide an option to delete evidence for a specific delegated administrator. Instead, when your management account deregisters Audit Manager, we perform a cleanup for the current delegated administrator account at the time of deregistration.

Method Signature

METHODS /AWS1/IF_AUM~DEREGISTERORGADMINACCOUNT
  IMPORTING
    !IV_ADMINACCOUNTID TYPE /AWS1/AUMACCOUNTID OPTIONAL
  RETURNING
    VALUE(OO_OUTPUT) TYPE REF TO /aws1/cl_aumderegorgadminacrsp
  RAISING
    /AWS1/CX_AUMACCESSDENIEDEX
    /AWS1/CX_AUMINTERNALSERVEREX
    /AWS1/CX_AUMRESOURCENOTFOUNDEX
    /AWS1/CX_AUMVALIDATIONEX
    /AWS1/CX_AUMCLIENTEXC
    /AWS1/CX_AUMSERVEREXC
    /AWS1/CX_RT_TECHNICAL_GENERIC
    /AWS1/CX_RT_SERVICE_GENERIC.

IMPORTING

Optional arguments:

iv_adminaccountid TYPE /AWS1/AUMACCOUNTID /AWS1/AUMACCOUNTID

The identifier for the administrator account.

RETURNING

oo_output TYPE REF TO /aws1/cl_aumderegorgadminacrsp /AWS1/CL_AUMDEREGORGADMINACRSP

Examples

Syntax Example

This is an example of the syntax for calling the method. It includes every possible argument and initializes every possible value. The data provided is not necessarily semantically accurate (for example the value "string" may be provided for something that is intended to be an instance ID, or in some cases two arguments may be mutually exclusive). The syntax shows the ABAP syntax for creating the various data structures.

DATA(lo_result) = lo_client->deregisterorgadminaccount( |string| ).

This is an example of reading all possible response values

lo_result = lo_result.
IF lo_result IS NOT INITIAL.
ENDIF.