For , you can configure AWS authentication on a per-user basis, using temporary credentials for superior security.
The following parameters must be set:
Property | Description | |
---|---|---|
| Set this value to | |
| Each user can specify credentials. |
To authenticate to AWS services from the using an IAM role:
Property | Description | |||||
---|---|---|---|---|---|---|
|
|
Please complete the following general steps.
Steps:
Instance role: Create an IAM role and link it to the EC2 instance where the is hosted. Include the following IAM policy:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": "sts:AssumeRole", "Resource": "arn:aws:iam::*:role/*" } ] } |
User role: Create another IAM role and provides required access to the S3 buckets. Example:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "MyBucketAndObjectPermissions", "Action": [ "s3:GetBucketLocation", "s3:ListBucket", "s3:DeleteObject", "s3:GetObject", "s3:PutObject" ], "Effect": "Allow", "Resource": [ "arn:aws:s3:::<my_s3_bucket>", "arn:aws:s3:::<my_s3_bucket>/*" ] }, { "Sid": "TrifactaPublicDatasets", "Effect": "Allow", "Action": [ "s3:GetObject", "s3:ListBucket" ], "Resource": [ "arn:aws:s3:::trifacta-public-datasets/*", "arn:aws:s3:::trifacta-public-datasets" ] } ] } |
where:<my_s3_bucket>
is the name of your bucket.
Under the user role definition, edit the Trust relationship. Add the instance role to Principal:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "AWS": [ "arn:aws:iam:: awsAccountId:role/instanceRole" ] }, "Action": "sts:AssumeRole" } ] } |
For more information, see Insert Trust Relationship in AWS IAM Role.
AWS Glue: If you are integrating with AWS Glue, additional permissions must be set. For more information, see Enable AWS Glue Access.
Log in the as a
.
Save your changes.
After per-user authentication has been enabled, each user must provide or be provided the credentials and S3 bucket to use. Users can insert a default S3 bucket and credentials to use in their profiles. See Configure Your Access to S3.