Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

If you do not want to login with a user who has an Administrator Access policy, you will need to provide several login details during the activation of IncrediBuild Cloud. These login details are included in a new customized role you have to create for this procedure. The login details are:

To generate these login details, you need to perform the following:

  1. Create a customized policy for low permissions.

  2. Create a customized role for low permissions, attach the customized policy to it, and configure the Trusted Relationships settings of this role.

Important! These procedures can be done only by an IAM user who has an Administrator Access policy and a Programmatic Access type.

Step 1 - Creating a Customized AWS Policy for Lower Permissions

The first step in the generation of login details for activating IncrediBuild Cloud with permissions lower than Administrator Access, is the creation of a customized policy.

> To create a customized policy for lower permissions:

  1. On AWS Management Console, enter in the Find Services box: IAM:

    Image Removed
  2. On the IAM page, click the Policies option:

    Image Removed
  3. On the Policies page, click the Create policy button:

    Image Removed
  4. On the first Create policy page, click the Choose a service option:

    Image Removed
  5. On the Service search box, enter: EC2. Then, click the EC2 option:

    Image Removed
  6. On the Actions section, select the All EC2 actions check box:

    Image Removed
  7. On the Resources section, click the Resources caption:

    Image Removed
  8. On the open Resources section, select the All resources radio button:

    Image Removed
  9. At the bottom of this page, click the Add additional permissions option:

    Image Removed
  10. On the same page on the Select a service section, enter on the Service search box: Service Quotas. Then, click the Service Quotas option:

    Image Removed
  11. On the same Service Quotas section, on the Actions sub-section, select for the Access level setting the Read check box:

    Image Removed
  12. Click on Add additional permissions

  13. On the same page on the Select a service section, enter on the Service search box: IAM. Then, click the IAM option:

    1. in the textbox Filter actions, insert CreateServiceLinkedRole and select it

    2. Under it click on Resources, select All resources

    3. Uner it, click on Request conditions, Open and click on Add condition

      1. Fill the following fields as shown and click Add

        Image Removed
  14. On the same page, click the Review policy button:

    Image Removed
  15. On the Create Policy page, enter in the Name box a name for the new policy:

    Image Removed

    Notes:
    - You should remember the name of this new policy. On the next stage, you will need to attach this policy to the customized role you will create for logging into IncrediBuild.
    - You can also add a description to the new policy.

  16. On the Create Policy page, click the Create policy button:

    Image Removed

    You return to the Policies page. A notification message appears, informing you of the creation of your new policy:

    Image Removed

After you created the new policy, the next step is creating a customized role, as described in the following section.

Step 2 - Creating a Customized AWS Role for Lower Permissions

The second step in the generation of login details for activating IncrediBuild Cloud with permissions lower than Administrator Access, is the creation of a customized role.

> To create a customized role for lower permissions:

  1. Open the Roles page, by clicking the Roles option:

    Image Removed
  2. On the Roles page, click the Create role button:

    Image Removed
  3. On the first Create role page - Select type of trusted entity section, select AWS service. On the Choose a use case section, select EC2, and then click the Next: Permissions button:

    Image Removed
  4. On the second Create role page, use the Filter policies box to find the customized policy you previously created. Then, select its check box and click the Next: Tags button:

    Image Removed
  5. [Optional] On the third Create role page, you can add tags to the new role you are creating. Then, click the Next: Review button:

    Image Removed
  6. On the fourth Create role page, enter a name for the new role in the Role name box. Then, click the Create role button to complete the creation of your new role:

    Image Removed

    You return to the Roles page. A notification message appears, informing you of the creation of your new role:

    Image Removed
  7. On the Roles page, locate the newly created role. Then, select its check box and click it to open it:

    Image Removed
  8. On the Summary page of the new role, click the Trust relationships tab. Then, click the Edit trust relationship button:

    Image Removed
  9. On the Edit Trust Relationship page, delete the existing content of the Policy Document pane:

    Image Removed
  10. On the Policy Document pane, copy and paste the following code snippet:

    Code Block
    {
      "Version": "2012-10-17",
      "Statement": [
        {
          "Effect": "Allow",
          "Principal": {
            "AWS": "arn:aws:iam::827268715074:user/incrediCloud"
          },
          "Action": "sts:AssumeRole",
          "Condition": {
            "StringEquals": {
              "sts:ExternalId": "<New_String_for_Your_External_ID>"
            }
          }
        }
      ]
    }

    The Policy Document pane should look as follows:

    Image Removed
  11. On the code snippet you pasted, enter a new string as the value of the sts:ExternalId parameter. This string will serve as your External ID, and you will need to provide it to IncrediBuild during the activation of IncrediBuild Cloud solution. IncrediBuild will use it to manage resources on your behalf.
    Note: It is recommended to create a complicated string for the External ID, for security reasons. However, you should be aware that AWS does not treat the external ID as a secret. The external ID for a role can be seen by anyone with a permission to view that role.

    Image Removed
  12. After you entered your unique External ID to the Policy Document pane, click the Update Trust Policy button.
    You return to the Summary page of the role you created. In this Summary page you can find the required login details for activating IncrediBuild Cloud with lower permissions:

    Image Removed

You have now completed the creation of all the necessary login details for activating IncrediBuild Cloud solution, and you can start the activation procedure.

...