# ProServe::Organizations::Account DeploymentAccountConfiguration (Optional) A dedicated deployment account can be used to further enhance security. This configuration creates a second role within the newly created account. This role trusts the given deployment account, allowing users in the given deployment account to assume the role. ## Syntax To declare this entity in your AWS CloudFormation template, use the following syntax: ### JSON
{
"AccountId" : String,
"RoleName" : String,
"AWSManagedPolicyArns" : [ String, ... ]
}
### YAML
AccountId: String
RoleName: String
AWSManagedPolicyArns:
- String
## Properties
#### AccountId
Deployment Account Id
_Required_: Yes
_Type_: String
_Minimum_: 12
_Maximum_: 12
_Update requires_: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)
#### RoleName
Deployment Role Name.
_Required_: No
_Type_: String
_Minimum_: 1
_Maximum_: 256
_Update requires_: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)
#### AWSManagedPolicyArns
A List of AWS managed policy arn's to attach to the deployment account role
_Required_: Yes
_Type_: List of String
_Update requires_: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)