Configure the Cross-Account IAM Role in the AWS
In this article
Overview
The Cross-Account IAM Role enables a client from an AWS account to access the resources of another AWS account temporarily using the Snaps that support Cross IAM role functionality. This helps organizations or different teams in an organization to access each other's AWS accounts without compromising security by sharing AWS credentials.
You can briefly allow access to your AWS account and specify the access duration. You must create a role and policy in your AWS account. The policy created by the host is attached to the access seeker's account. This cross-account IAM role enables SnapLogic to trigger the necessary APIs.
Prerequisites
Familiarity with the SnapLogic and AWS platform.
DynamoDB Account.
Key Steps
Create the Cross-Account IAM Role and Policy in the AWS Account
Log in to the AWS Management Console and navigate to IAM > Roles.
Click Create role > Another AWS Account. Specify the account ID for the other account that will access your account.
Enter the account number of the access seeker in the Account ID field. For more information, refer to View AWS account identifiers - AWS Account Management.
Optionally, add an additional security layer to authenticate for each login by checking the Options checkbox next to Require external ID.
Click Next: Permissions. When the Attach permission policies screen displays where you can set the permissions, select the checkbox next to the applicable policy for this role.
Optionally, as appropriate add tags. Click Next: Tags to skip to the next screen.
Click Next: Review to skip to the next screen.
Review the information displayed and add a name for the role. Click Create role.
Learn more at What is IAM? - AWS Identity and Access Management.
Associate the IAM Policy with the Created Role
In the AWS console, click Users and select the username which is listed in the table.
On the Summary screen, select the desired user and click Add inline policy to attach the policy.
Click the JSON tab, enter the policy's details in the editor, and Click Review Policy.
Review the policy summary. Add a name and, optionally, a description for this policy, and click Create policy. The policy is created and can now be assigned to the Cross-account IAM role.
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "sts:AssumeRole", "Resource": "arn:aws:iam::<userid><IAM role>" } ] }
The sts:AssumeRole must be added to the policy for Cross-Account IAM role support. The Role ARN displays on the summary tab when this role is created.
Account Settings for Access Through SnapLogic
Specify the details based on the DynamoDB Account scenario. The credentials should belong to the IAM policy associated with the role.
Related Content
Have feedback? Email documentation@snaplogic.com | Ask a question in the SnapLogic Community
© 2017-2024 SnapLogic, Inc.