Configure a role-based IAM user for AWS
The following steps have been provided as an example to help you create a role-based cloud account:
Steps
- Log in to the AWS Management Console.
 -  
		  Complete the following steps to create a role: 
		   
		  
- In the navigation pane of the IAM console, select Roles, and then click Create role.
 - Select the type of trusted entity as Another AWS Account.
 - Copy the Trusted Account number from Cloud Snapshot Manager and paste it in the Account ID field of the console.
 -  
				In 
				  Options, select 
				   Require external ID. 
				 
				Do not select Require MFA.
 - Copy the External ID value from Cloud Snapshot Manager to the External ID field of the console, and then click Next: Permissions.
 - Click Next: Tags.
 - Click Next: Review.
 - Enter a unique role name, review the role, and click Create role.
 - Search for the new role and copy the role ARN value.
 
 -  
		   Complete the following to create a policy: 
		   
		  
-  
				Copy content from 
				  AWS minimum permission policy. 
				 
				For details about each AWS permission and how it is used by Cloud Snapshot Manager, see AWS permission usage.
 - In the navigation pane of the IAM console, select Policies, and then click Create policy.
 - Select the JSON tab, and paste the copied content from the portal.
 - Click Review policy.
 - Enter a policy name and click Create policy.
 
 -  
				Copy content from 
				  AWS minimum permission policy. 
				 
				
 -  
		  Associate the policy with the role using the following steps: 
		   
		  
- Search for the role in the Roles page and click on it.
 - Under the Permissions tab, click Attach Policies and search for the newly created policy.
 - Select the policy and click Next: Review.
 - Click Attach Policy.
 
 -  
		  (Optional) Establish a trust relationship using the following steps: 
		   
		  This step is required only if you want to copy data from a cloud account to PowerProtect DD Virtual Edition (DDVE) or restore data from DDVE. The step can be performed at a later stage whenever you want to copy to DDVE.
- Search for the role in the Roles page and click on it.
 -  
				Under the 
				  Trust Relationships tab, click 
				   Edit Trust Relationship. The following generated JSON content is displayed: 
				 
				  
{ "Version": "<POLICY_VERSION_DATE>", "Statement": [ { "Effect": "Allow", "Principal": { "AWS": "<CLOUD_ACCOUNT_NUMBER>" }, "Action": "sts:AssumeRole", "Condition": { "StringEquals": { "sts:ExternalId": "<EXTERNALID>" } } }, ] }NOTE: If the trusted account number is 069562425525, replace the <CLOUD_ACCOUNT_NUMBER> with the new trusted account number 903193600893 to migrate from an old trusted account to a new trusted account. -  
				Append the following to the existing Statement array: 
				 
				  
{ "Effect": "Allow", "Principal": { "Service": "ecs-tasks.amazonaws.com" }, "Action": "sts:AssumeRole" } - Click Update Trust Policy.
 
 - Paste the role ARN value for the newly created role in the corresponding field in Cloud Snapshot Manager.
 - Click Save.