User getting created in master account instead of child account

I’m trying to create a user in a child account (deployments) that is in the same organization as my master payer account. I’m using my own credentials for AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY and running the terraform apply locally on my laptop.
The issue that I’m having is that even though I have an assume_role block in my provider that is pointing to the correct “role/OrganizationAccountAccessRole” in the child account, the account itself is being created in the master payer account. How can I create the account in the child account while still using my own credentials from master payer instead of having to use the actual account’s credentials? I was under the impression that this is what the assume_role block was supposed to do?

terraform {
  backend "s3" {
    bucket = "<redacted>"
    key    = "my_org/deployments_ou/accounts/deployments/iam/terraform.tfstate"
    region = "us-east-1"
  
    assume_role {
      role_arn     = "arn:aws:iam::${data.terraform_remote_state.deployments_account.outputs.account_id}:role/OrganizationAccountAccessRole"
      session_name = "sa_jenkins"
    }
  }
}

data "terraform_remote_state" "deployments_account" {
  backend = "s3"

  config = {
    bucket = "<redacted>"
    key    = "my_org/deployments_ou/accounts/deployments/create_account/terraform.tfstate"
    region = "us-east-1"
  }
}

module "create_jenkins_user" {
  source  = "terraform-aws-modules/iam/aws//modules/iam-user"
  version = "~> 3.7"
  name = "sa_jenkins"
  create_iam_user_login_profile = false
}