This document explains the steps to integrating Amazon Web Services (AWS) with Cloud IAM to provision, manage, and monitor access to the Cloud Service Provider (CSP).
Requirements
- An AWS account.
- A management account or account with IAM permissions.
Create a policy in the AWS console
- In the AWS Console, go to the IAM page.
- In the side menu, click Access management > Policies.
- Click Create policy.
- In the Policy editor, click the JSON option.
- Copy the following JSON and paste it into the policy editor:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"opsworks:DescribeStacks",
"iam:DeleteAccessKey",
"opsworks:DescribePermissions",
"iam:CreateUser",
"iam:CreateAccessKey",
"iam:CreateLoginProfile",
"opsworks:UpdateUserProfile",
"iam:RemoveUserFromGroup",
"iam:AddUserToGroup",
"iam:ListAttachedUserPolicies",
"iam:DetachUserPolicy",
"opsworks:CreateUserProfile",
"iam:DeleteLoginProfile",
"iam:ListAccessKeys",
"iam:GetPolicyVersion",
"iam:ListPolicies",
"iam:GetPolicy",
"iam:AttachUserPolicy",
"iam:DeleteUserPolicy",
"opsworks:DescribeUserProfiles",
"iam:UpdateAccessKey",
"iam:ListRoles",
"iam:DeleteUser",
"iam:ListUserPolicies",
"opsworks:DeleteUserProfile",
"iam:ListGroupsForUser",
"opsworks:DescribeInstances",
"iam:ListUsers",
"iam:ListGroups",
"iam:GetUser",
"iam:GetLoginProfile",
"iam:GetAccountAuthorizationDetails"
],
"Resource": "*"
}
]
}
- Click Next.
- Enter a name for the policy.
- (Optional): Configure optional settings, such as description and tags.
- Click Create policy.
For more details, see the Create IAM policies (console) AWS documentation.
Create a user with the custom policy in the AWS console
- In the AWS console, go to the IAM page.
- In the side menu, click Access management > Users.
- Click Create user.
- Enter an username and click Next.
- In the Permission options field, select the Attach policies directly.
- In the Permissions policies table, select the policy you created on Create a policy in the AWS console.
- Click Create user.
For more details, see the Create an IAM user in your AWS account AWS documentation.
Create an access key for the user in the AWS console
- In the AWS console, go to the IAM page.
- In the side menu, click Access management > Users.
- Click the user you created on Create a user with the custom policy in the AWS console
- Go to the Security credentials tab.
- In the Access keys section, click Create access key and tick the checkbox: "I understand the above recommendation and want to proceed to create an access key.".
- (Optional): Enter a description tag.
- Click Create access key.
- Copy the access key value and the secret access key and save them.. You can also click the Download .csv file button to download the credentials. You’ll need these values when you integrate your account with Segura.
For more details, see the Manage access keys for IAM users AWS documentation.
Integrate AWS with Cloud IAM
To integrate an AWS account with Cloud IAM, see the following steps:
- On Segura, in the navigation bar, hover over the Products menu and select Cloud IAM.
- In the side menu, select Management > Accounts.
- In the top right corner, click Add.
- In the Settings tab, enter the following information:
- In the Name field, enter a name for the account.
- (Optional): In the Optional field, enter a description for the account.
- (Optional): In the Tags field, enter tags to help identifying the account.
- Click Continue.
- In the AWS tab, enter the following information about the AWS provider:
- In the Access Key field, enter the access key obtained in the step 9. of the section Create an access key for the user in the AWS console.
- In the Secret Access Key field, enter the secret access key obtained in the step 9. of the section Create an access key for the user in the AWS console.
- In the Default Region * field, select your AWS account region.
- Click Continue until you get to the Review tab.
- In the Review tab, verify all the information previously entered in the past tabs, and click Save.
The newly added account will appear in the Accounts report.
Do you still have questions? Reach out to the Segura Community.