...
Rw ui steps macro | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Access the Roles area in the IAM console and click Create role.
Create a role with the scope Another AWS account and use
Add the policy you created in the previous steps (for example:
Give this role a name that you will provide to Devo.
Go to the newly created role and access Trust relationships → Edit trust relationship.
Change the existing policy document to the following, which will only allow for our collector server role to access the policy.
Optionally, you may add an external ID (see more information here). Add in an external ID generated by customer and hand it to Devo as well.
For a Devo developer to access your collector, we will need you to add another principal. This will allow us to debug your collector quickly. It will look something like this:
Click Update Trust Policy to finish. |
Info |
---|
New role If you’re deploying your collector using the Cloud collector app, you should use the following role instead of the one above:
This role is for the legacy collector server and now is deprecated
For more information, please contact us. |
Information provided to Devo
...