Step-3: Create Role / IAM User
DigitalEx supports both types of AWS authentications,
Role Based
Access/Secret Key Based
Role-based access is generally considered to be more secure than user-based access, as it allows organizations to control access to resources and functions based on defined roles and responsibilities. We recommend using roles over individual users whenever possible
Creating Role
Go to IAM from the Services tab.
Click on Roles from the left menu options and Click on
Create Role
Select
AWS Accounts
and selectAnother AWS Account
froman AWS Account
tabspecify
Account ID
as911403356698
(This is the Account Id of DigitalEx which is universal)Check on options
Require external ID
and enter the tenant id. To get the tenant id to follow instructions,Login to DigitalEx
From the side menu, select
API
under theAdmin
sectionCapture the Tenant ID & enter it into the External ID field
Click
Next: Permissions
, don’t select any permissionsClick
Next: Tags
Click
Next: Review
Enter the role name with prefix ‘digitalex-’ e.g: digitalex-rolename
Enter the Role Name of your choice and Click Create Role.
A new role should be created and displayed on the list.
Click on the newly created Role which is navigated to the below page
Click on
Add Permissions -> Create Inline Policy
underPermissions
Tab & Click onJSON
tab & replace existing JSON with the following JSONJSON
JSON{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "s3:GetObject", "s3:ListBucket" ], "Resource": [ "arn:aws:s3:::<BUCKET_NAME>", "arn:aws:s3:::<BUCKET_NAME>/*" ] }, { "Effect": "Allow", "Action": [ "organizations:Describe*", "organizations:List*" ], "Resource": "*" }, { "Effect": "Allow", "Action": [ "ce:Get*", "ce:Desc*", "ce:List*" ], "Resource": "*" }, { "Effect": "Allow", "Action": [ "iam:Get*", "iam:List*", "iam:SimulateCustomPolicy", "iam:SimulatePrincipalPolicy" ], "Resource": "*" }, { "Effect": "Allow", "Action": [ "cur:Get*", "cur:ValidateReportDestination", "cur:Describe*" ], "Resource": "*" } ] }
And replace
<BUCKET_NAME>
on lines 11 & 12 with the name of the bucket captured in Step-1: Enable CUR & Cost ExplorerReview Policy, Name it & Click
Create policy
Capture
Role ARN
of the role we created from the summary section for the next steps.
Creating IAM User & Access/Secret Keys
This step is not required if you have created a Role.
Go to IAM from the Services tab & navigate to Users tab
Click Add Users, enter name of your choice
Skip permissions for now. Keep doing Next & finally Create User.
Open the User you have created & click on Security credentials.
Scroll down & click on Create access key
Select Others & click on next
Click on Create Access Key
Save Access key ID and Secret access key for later use.
Click Done
Navigate to the details of the user we just created
Click
Add Inline Policy
underPermissions
Tab & Click onJSON
tab & replace existing JSON with the following JSONJSON
JSON{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "s3:GetObject", "s3:ListBucket" ], "Resource": [ "arn:aws:s3:::<BUCKET_NAME>", "arn:aws:s3:::<BUCKET_NAME>/*" ] }, { "Effect": "Allow", "Action": [ "organizations:ListAccounts", "organizations:DescribeAccount" ], "Resource": "*" }, { "Effect": "Allow", "Action": [ "ce:Get*", "ce:Desc*", "ce:List*" ], "Resource": "*" }, { "Effect": "Allow", "Action": [ "iam:Get*", "iam:List*", "iam:SimulateCustomPolicy", "iam:SimulatePrincipalPolicy" ], "Resource": "*" }, { "Effect": "Allow", "Action": [ "cur:Get*", "cur:ValidateReportDestination", "cur:Describe*" ], "Resource": "*" } ] }
And replace
<BUCKET_NAME>
on lines 11 & 12 with the name of the bucket captured in Step-1: Enable CUR & Cost Explorer
Review the policy & click create