# ProServe::Organizations::Account DeploymentAccountConfiguration (Optional) A dedicated deployment account can be used to further enhance security. This configuration creates a second role within the newly created account. This role trusts the given deployment account, allowing users in the given deployment account to assume the role. ## Syntax To declare this entity in your AWS CloudFormation template, use the following syntax: ### JSON
{ "AccountId" : String, "RoleName" : String, "AWSManagedPolicyArns" : [ String, ... ] }### YAML
AccountId: String RoleName: String AWSManagedPolicyArns: - String## Properties #### AccountId Deployment Account Id _Required_: Yes _Type_: String _Minimum_:
12
_Maximum_: 12
_Update requires_: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)
#### RoleName
Deployment Role Name.
_Required_: No
_Type_: String
_Minimum_: 1
_Maximum_: 256
_Update requires_: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)
#### AWSManagedPolicyArns
A List of AWS managed policy arn's to attach to the deployment account role
_Required_: Yes
_Type_: List of String
_Update requires_: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)