Connect an AWS account
  • 2 minutes to read
  • Dark
    Light
  • PDF

Connect an AWS account

  • Dark
    Light
  • PDF

Article summary

This document outlines the steps to integrating Amazon Web Services (AWS) with Cloud IAM to provision, manage, and monitor access to the Cloud Service Provider (CSP).

Info

Cloud IAM also supports Google Cloud Services (GCP) and Microsoft Azure. If you want to integrate other CSPs, check the documentation Connect a Google Cloud account or Connect an Azure account.

Before you integrate an AWS account with senhasegura, you’ll need an AWS account and a Management account role or an account with IAM permissions.

Create a custom policy in the AWS Console

  1. In the AWS Console, navigate to the IAM page.
  2. Go to the Policies page.
  3. Click Create policy.
  4. In Policy editor, click the JSON option.
  5. Copy the JSON content below and paste it into the policy editor.
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "VisualEditor0",
      "Effect": "Allow",
      "Action": [
        "opsworks:DescribeStacks",
        "iam:DeleteAccessKey",
        "opsworks:DescribePermissions",
        "iam:CreateUser",
        "iam:CreateAccessKey",
        "iam:CreateLoginProfile",
        "opsworks:UpdateUserProfile",
        "iam:RemoveUserFromGroup",
        "iam:AddUserToGroup",
        "iam:ListAttachedUserPolicies",
        "iam:DetachUserPolicy",
        "opsworks:CreateUserProfile",
        "iam:DeleteLoginProfile",
        "iam:ListAccessKeys",
        "iam:ListPolicies",
        "iam:AttachUserPolicy",
        "iam:DeleteUserPolicy",
        "opsworks:DescribeUserProfiles",
        "iam:UpdateAccessKey",
        "iam:ListRoles",
        "iam:DeleteUser",
        "iam:ListUserPolicies",
        "opsworks:DeleteUserProfile",
        "iam:ListGroupsForUser",
        "opsworks:DescribeInstances",
        "iam:ListUsers",
        "iam:ListGroups",
        "iam:GetUser",
        "iam:GetLoginProfile",
        "iam:GetAccountAuthorizationDetails"
      ],
      "Resource": "*"
    }
  ]
}
  1. Click Next.
  2. Give your policy an easily identifiable name.
  3. Configure optional settings if needed.
  4. Click Create policy.
Info

For more details, check the AWS documentation on how to create IAM policies.

Create a user with the custom policy in the AWS Console

  1. In the AWS Console, navigate to the IAM page.
  2. Go to the Users page.
  3. Click Create user.
  4. Attribute a username and click Next.
  5. Select the option Attach policies directly.
  6. Select the policy you created in the previous steps from the list
  7. Click Create user.
Info

For more details, check the AWS documentation on how to create a user.

Create an access key for the user in the AWS Console

  1. In the AWS Console, navigate to the IAM page.
  2. Go to the Users page.
  3. Click the user you created in the previous steps.
  4. Navigate to the Security credentials tab.
  5. In the Access keys section, click Create access key.
  6. Select the Third-party service option.
  7. Add a tag if needed.
  8. Click Create access key.
  9. Copy the access key value and the secret access key and paste them into a text editor. You can also click the Download .csv file button to download the credentials. You’ll need these values for when you integrate your account with senhasegura.
Info

For more details, check the AWS documentation on how to create an access key.

Integrate AWS with Cloud IAM

  1. In the top left corner of the senhasegura platform, click on the Grid Menu, represented by the nine squares, and select Cloud IAM.
  2. In the side menu, select Settings > Accounts.
  3. Click the View actions icon, represented by the three vertical dots, and select the option Add account.
  4. In the pop-up window, give a Name for the account.
  5. Click AWS.
  6. Click the AWS tab.
  7. Paste the user access key in the Access Key field.
  8. Paste the secret key in the Secret Access Key field.
  9. Select the Default Region.
  10. Click the Confirm button.

Once you’re done, the senhasegura Accounts page will refresh with your newly integrated AWS account.


Was this article helpful?