...
If users are providing key-secret combinations, the following information is required.
Item | Description |
---|---|
key/secret | (credential provider type is default ) The AWS key and secret for the user to authenticate |
default bucket | The default S3 bucket where the user can upload data and store generated results |
extra buckets | Any extra S3 buckets to which the user should have access |
Method 2 - AWS IAM Role ARNs
Users can access AWS resources by assigning an awsConfig object to the account.
Tip |
---|
Tip: This method is recommended. |
The following information is required:
Item | Description | ||
---|---|---|---|
IAM role | (credential provider type is
| ||
default bucket | The default S3 bucket where the user can upload data and store generated results | ||
extra buckets | Any extra S3 buckets to which the user should have access |
Authentication objects
For each authentication method, the above pieces of information must be provided for each user.
These pieces of information are defined in an awsConfig
object. An awsConfig object is a set of AWS configuration properties that can be created, modified, and assigned to individual users via API.
For Method 2, the awsConfig object maps to an awsRole object. An awsRole object references an IAM role and an awsConfig object. When you create an awsConfig object and its credential provider is set to temporary
, the awsRole object is automatically created for you:
- Each awsRole object maps to a single IAM role.
- Each awsRole object is mapped to an awsConfig object.
- The awsConfig object is then assigned to individual users.
- Through this mechanism, you have more flexibility in assigning the active role to users.
- As needed, the awsConfig object can be mapped at a later time to another awsRole object through the
role
attribute.
This workflow steps through the process for all these methods.
Platform roles
To complete this workflow, your account must have one of the following roles:
- Workspace admin
D s item item admin
Basic Workflow
- Choose your method of authentication.
- Locate the internal identifier for the user to which to assign the configuration object.
- Create an
awsConfig
object, assigning the object to the user as part of the process. - Verify that the assignment is working.
...