# ProServe::Organizations::Account DeploymentAccountConfiguration (Optional) A dedicated deployment account can be used to further enhance security. This configuration creates a second role within the newly created account. This role trusts the given deployment account, allowing users in the given deployment account to assume the role. ## Syntax To declare this entity in your AWS CloudFormation template, use the following syntax: ### JSON
{
    "AccountId" : String,
    "RoleName" : String,
    "AWSManagedPolicyArns" : [ String, ... ]
}
### YAML
AccountId: String
RoleName: String
AWSManagedPolicyArns: 
      - String
## Properties #### AccountId Deployment Account Id _Required_: Yes _Type_: String _Minimum_: 12 _Maximum_: 12 _Update requires_: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt) #### RoleName Deployment Role Name. _Required_: No _Type_: String _Minimum_: 1 _Maximum_: 256 _Update requires_: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt) #### AWSManagedPolicyArns A List of AWS managed policy arn's to attach to the deployment account role _Required_: Yes _Type_: List of String _Update requires_: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)