Comment on page
Amazon Web Services (AWS)
Integration with AWS
To provide data tailored to your organization, we require limited, read-only access to information about your AWS infrastructure.
This is done securely using AWS's Identity and Access Management (IAM) with two policies: a permissions policy and a trust policy. The permissions policy defines what actions a trusted user can take (like listing EC2 instances and VPCs), and the trust policy adds Cased a trusted user.
- 1.Sign in to the AWS Management Console
- Sign in to your AWS Management Console.
- Navigate to the IAM service.
- 2.Create a new permissions policy for Cased
- Click on "Policies" on the left-hand navigation pane
- Click on the "Create policy" button.
- Switch to JSON editor instead of visual.
- Paste the following JSON, then click "Next" and give the policy a name (like "CasedPolicy") and description. Then click "Create policy".
- 3.Create a new IAM Role
- Click on "Roles" in the left-hand navigation pane, then click on the "Create role" button.
- 4.Specify Trusted Entity
- On the "Create role" page, select "AWS Account", and then "Another AWS account" as the trusted entity type, and provide our AWS account ID: 495860673956
- 5.Attach Permissions Policy
- Next, you need to select the permissions policy you created earlier and click "Next"
- Now, give the role a name (like "CasedRole") and description, then click "Create role".
- 6.Provide Role ARN
- Almost done! Once the role is created, it will appear in the list of roles in your IAM console
- Click on the role name, and you'll see the Role ARN at the top of the Summary page. It'll look something like this: arn:aws:iam::995840643156:role/CasedRole
- Enter the Role ARN on the AWS Connections page of Cased.