Configure a role-based IAM user for AWS
The following steps have been provided as an example to help you create a role-based cloud account:
Steps
- Log in to the AWS Management Console.
-
Complete the following steps to create a role:
- In the navigation pane of the IAM console, select Roles, and then click Create role.
- Select the type of trusted entity as Another AWS Account.
- Copy the Trusted Account number from Cloud Snapshot Manager and paste it in the Account ID field of the console.
-
In
Options, select
Require external ID.
Do not select Require MFA.
- Copy the External ID value from Cloud Snapshot Manager to the External ID field of the console, and then click Next: Permissions.
- Click Next: Tags.
- Click Next: Review.
- Enter a unique role name, review the role, and click Create role.
- Search for the new role and copy the role ARN value.
-
Complete the following to create a policy:
-
Copy content from
AWS minimum permission policy.
For details about each AWS permission and how it is used by Cloud Snapshot Manager, see AWS permission usage.
- In the navigation pane of the IAM console, select Policies, and then click Create policy.
- Select the JSON tab, and paste the copied content from the portal.
- Click Review policy.
- Enter a policy name and click Create policy.
-
Copy content from
AWS minimum permission policy.
-
Associate the policy with the role using the following steps:
- Search for the role in the Roles page and click on it.
- Under the Permissions tab, click Attach Policies and search for the newly created policy.
- Select the policy and click Next: Review.
- Click Attach Policy.
-
(Optional) Establish a trust relationship using the following steps:
This step is required only if you want to copy data from a cloud account to PowerProtect DD Virtual Edition (DDVE) or restore data from DDVE. The step can be performed at a later stage whenever you want to copy to DDVE.
- Search for the role in the Roles page and click on it.
-
Under the
Trust Relationships tab, click
Edit Trust Relationship. The following generated JSON content is displayed:
{ "Version": "<POLICY_VERSION_DATE>", "Statement": [ { "Effect": "Allow", "Principal": { "AWS": "<CLOUD_ACCOUNT_NUMBER>" }, "Action": "sts:AssumeRole", "Condition": { "StringEquals": { "sts:ExternalId": "<EXTERNALID>" } } }, ] }
NOTE: If the trusted account number is 069562425525, replace the <CLOUD_ACCOUNT_NUMBER> with the new trusted account number 903193600893 to migrate from an old trusted account to a new trusted account. -
Append the following to the existing Statement array:
{ "Effect": "Allow", "Principal": { "Service": "ecs-tasks.amazonaws.com" }, "Action": "sts:AssumeRole" }
- Click Update Trust Policy.
- Paste the role ARN value for the newly created role in the corresponding field in Cloud Snapshot Manager.
- Click Save.