Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Rw ui steps macro
Rw step

Access the Roles area in the IAM console and click Create role.

wesw.png
Rw step

Create a role with the scope Another AWS account and use Account ID:837131528613

Rw step

Add the policy you created in the previous steps (for example: devo-xaccount-cs-policy)

eded.png
Rw step

Give this role a name that you will provide to Devo.

cccc.png
Rw step

Go to the newly created role and access Trust relationshipsEdit trust relationship.

bhbh.png
Rw step

Change the existing policy document to the following, which will only allow for our collector server role to access the policy.

Code Block
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Principal": {
        "AWS": "arn:aws:iam::837131528613:role/devo-xaccount-cs-role"
      },
      "Action": "sts:AssumeRole",
      "Condition": {}
    }
  ]
}

Optionally, you may add an external ID (see more information here). Add in an external ID generated by customer and hand it to Devo as well.

Code Block
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Principal": {
        "AWS": "arn:aws:iam::837131528613:role/devo-xaccount-cs-role"
      },
      "Action": "sts:AssumeRole",
      "Condition": {"StringEquals": {"sts:ExternalId": "ABCDEFGHIJKL0123"}} <-- Change this
    }
  ]
}

For a Devo developer to access your collector, we will need you to add another principal. This will allow us to debug your collector quickly. It will look something like this:

Code Block
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Principal": {
        "AWS": "arn:aws:iam::837131528613:role/devo-xaccount-cs-role"
      },
      "Action": "sts:AssumeRole",
      "Condition": {}
    },
    {
      "Effect": "Allow",
      "Principal": {
        "AWS": "arn:aws:iam::staging_account_id837131528613:role/devo-xaccount-cs-role"
      },
      "Action": "sts:AssumeRole",
      "Condition": {}
    }
  ]
}
Rw step

Click Update Trust Policy to finish.

Info

New role

If you’re deploying your collector using the Cloud collector app, you should use the following role instead of the one above:

arn:aws:iam::476382791543:role/devo-xaccount-cc

This role is for the legacy collector server and now is deprecated

arn:aws:iam::837131528614:role/devo-xaccount-cs-role

For more information, please contact us.

Information provided to Devo

...