- 5 minutes to read
- Print
- DarkLight
- PDF
Add account
- 5 minutes to read
- Print
- DarkLight
- PDF
To manage users, accounts, credentials, and virtual machines you must create an account to integrate senhasegura with the Cloud Service Providers (CSPs).
To prevent excess privileges, Cloud IAM requests only the necessary permissions.
Add an account
To add an account, follow the steps:
- Access Cloud IAM > Management > Accounts.
- Click the Add button.
- In the Name field, enter a name.
- Select if the account will be enabled or not.
- (Optional): Enter a description.
- (Optional): Enter tags.
- Navigate to the providers’ tab you want to register.
You can register AWS, Azure and Google Cloud accounts on the same screen at the same time.
Add an AWS account
To add an AWS account, follow the steps:
- Access Cloud IAM > Management > Accounts.
- Add or edit a Cloud IAM account.
- Go to the AWS tab.
- Click the View JSON button to open the required permissions.
- In the Access key field, enter the AWS access key.Info
To learn how to create an AWS access key, go to Configure AWS section in this document.
- In the Secret Access Key field, enter the AWS secret access key.
- In the Default Region * field, select the default region.
- In the IAM section, tick the check boxes according to the permissions you want to give.
- Go to the Review tab and click Save.
Add an Azure account
To add an Azure account, follow the steps:
- Access Cloud IAM > Management > Accounts.
- Add or edit a Cloud IAM account.
- Go to the Azure tab.
- In the Directory (tenant) ID* field, enter the directory (tenant) ID.
- In the Application (Client ID)* field, enter the application (client ID).
- In the Client secret value* field, enter the client secret value.your title goes here
To learn how to create a Client secret value, go to the Configure Azure section in this document.
- In the IAM section, tick the check boxes according to the permissions you want to give.
- Go to the Review tab and click Save.
Add a Google Cloud account
To add a Google Cloud account, follow the steps:
- Access Cloud IAM > Management > Accounts.
- Add or edit a Cloud IAM account.
- Go to the Google Cloud tab.
- Click Choose file and select the file with the Google Cloud account access key.Info
To learn how to create a Google Cloud access key, go to the Configure Google Cloud section in this document.
- Go to the Review tab and click Save.
Configure providers
In order to integrate Cloud IAM with AWS, Azure, and Google Cloud you must perform the following configurations for each one of the providers.
Configure AWS
To integrate Cloud IAM and AWS you must create an AWS access key.
Create an AWS access key
To create an AWS access key, follow the steps:
- On the AWS register screen, click View JSON and copy the permissions.
- Log in to Amazon Web Services.
- Go to Identity and Access Management (IAM).
- On the left menu, select Policies.
- Click Create Policy, go to the JSON tab, and paste the permissions copied in step 1.Alert
You must create the access keys for a user that has the same permissions described in the
.json
file. - Click Next:Tags.
- (Optional): Enter the tags.
- Click Next:Review.
- Enter the policy name and click Create policy to confirm.
- On the left menu, go to Users and select Add user.
- On Specify user's details, enter the username and click Next.
- On Define permissions, go to Attach policies directly and select the policy you created in step 8..
- Go back to Users and select a user.
- Go to the Security credentials tab and select Create access keys.
- Copy the Access Key ID and Secret access key values.
Configure Google Cloud
To integrate the Cloud IAM with your Google Cloud account you must perform the following actions:
Create a role
- Log in to your Google Cloud account.
- In the project selection, select the Organization and click Roles.
- Click Create role and fill in the fields:
- Title with the name of the role you want to create.
- Click Add permissions and add the following permissions:
iam.roles.list
iam.serviceAccountKeys.create
iam.serviceAccountKeys.delete
iam.serviceAccountKeys.get
iam.serviceAccountKeys.list
iam.serviceAccounts.create
iam.serviceAccounts.delete
iam.serviceAccounts.get
iam.serviceAccounts.list
resourcemanager.organizations.get
resourcemanager.organizations.getIamPolicy
resourcemanager.organizations.setIamPolicy
resourcemanager.projects.get
resourcemanager.projects.getIamPolicy
resourcemanager.projects.list
resourcemanager.projects.setIamPolicy
- Click Create.
Create a service account
To create a Service account in Google Cloud, follow the steps:
- Select an existing project or create a new one in Google Cloud.
- On the navigation menu, choose the IAM & Admin, Service Accounts option.
- Click Create service account.
- Fill in the Service account name fields and click Create.
- Click Done.
Create a Google Cloud access key
- On the Service Accounts menu, select the service account you have just created.
- Click Add key and select Create new key.
- Select the JSON option and click Create.
- Store the key in a safe place.
Enable APIs
- Access the APIs & Services > Library menu.
- Find the APIs listed below and select Enable.
- Cloud Resource Manager API
- Cloud Asset API
- Identity and Access Management (IAM) API
Add a service account at Organization
- Select the IAM service in the side menu.
- Click Add at the top of the page.
- In the New members field, enter the address of the service account you just created.
- In the Select a role field, select a previously created role.
- Click Save.
Configure Azure
To integrate the Cloud IAM with your Azure account you must perform the following actions.
Create an Azure service account
- Log in to your Azure account.
- Locate the service Azure Active Directory.
- On the left menu, select Application register.
- Select New register.
- Fill in the Name, Support account type, and URI redirect fields.
- Click Register.
Create a Client secret value
- Select an application in Azure.
- On the left menu, select Certificates and secrets.
- Click New Client Secret.
- Enter a description and expiration.
- Copy the value of the secret.
Select API permissions
- In Azure, select:
- On the left menu, select API permissions.
- Select Microsoft Graph.
- The requested permissions are:
- Directory Role:
- Global Administrator
- Tenant root group role
- Owner
- API permissions
- Delegated:
Directory.AccessAsUser.All
- Application:
Application.ReadWrite.All
AppRoleAssignment.ReadWrite.All
Directory.Read.All
Directory.ReadWrite.All
Organization.ReadWrite.All
RoleManagement.ReadWrite.Directory
User.ManageIdentities.All
User.ReadWrite.All
- Delegated:
- Directory Role:
Do you still have questions? Reach out to the senhasegura Community.