If you are using per-user authentication through an AWS IAM role, you must insert a trust relationship into the role so that Trifacta® can leverage it.
NOTE: These steps should be performed by an AWS administrator.
Please acquire the following information:
Account ID: The AWS account identifier that Trifacta should use for access.
NOTE: This value is provided to you by Alteryx.
After it has been specified, this value is available for workspace administrators through the Admin console. See AWS Settings Page.
- External ID:The external identifier is set within Trifacta. This value is available for workspace administrators through the Admin console. See AWS Settings Page.
- IAM role: The AWS IAM role that Trifacta should use.
For more information on the AWS Principal options described below, please review https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_principal.html.
- Login to the AWS console.
- Open the IAM role for use with Trifacta.
Insert the following AWS policy snippet to define the trust relationship for this role:
The AWS account identifier for Trifacta
The external identifier generated by Trifacta
Save the IAM role definition.
NOTE: The AWS account ID value must be applied to every user profile that requires access through this IAM role. See User Profile Page.
This page has no comments.