AWS Receptor: IAM User - multiple AWS accounts instructions
How to setup the AWS receptor to authenticate using an IAM user with multiple AWS accounts
This page explains just one of your authentication configuration options. See all options for configuring how the Trustero receptor authenticates to AWS.
These instructions explain how to grant the AWS receptor access to multiple AWS accounts to retrieve evidence using an IAM user authentication.
Requirements:
- You must use AWS organizations with a management account and multiple member accounts.
- If you don't use AWS organizations with a management account and member accounts or you prefer to use multiple receptors, you can setup a receptor per account: AWS Receptor: Single Account Access Instructions.
High-level steps to setup the receptor:
- Create the trustero-api-user that is used by the receptor to access the AWS accounts. Pick one of these options:
- Return to the receptor in Trustero and enter the Access Key Id and Secret Access Key created in step 1.
Read on for full details.
Automated Instructions
These instructions use the AWS CLI and CloudFormation to create the trustero-api-user in multiple AWS accounts.
| 1. Find the management account's ID |
Using the AWS CLI: aws organizations describe-organization --query 'Organization.MasterAccountId' --output text
|
|
2. Create management account's IAM user and policy |
CloudFormation template: {
|
|
3. Create member account IAM role (repeat for every member account) |
When creating the stack from the template below, enter the management account ID from Step 1 into the ManagementAccountId in the Parameters section. CloudFormation template: {
|
| 4. Create management account user's security credentials |
Using the AWS CLI: aws iam create-access-key --user-name trustero-api-userSave the Access key ID and the Secret access key so you can provide it to the receptor. |
Return to the receptor in the Trustero application to complete activation.
Manual Instructions
These instructions guide you through using the AWS web console to provision access to Trustero's receptor into you AWS accounts.
| 1. Find the management account's ID |
|
| 2. Create management account IAM policy |
|
| 3. Create management IAM user and assign permissions |
|
|
4. Create member account IAM role (repeat for every member account) |
“AWS": “arn:aws:iam::123456789012:user/trustero-api-user” |
| 5. Create management account user's security credentials |
|
Return to the receptor in the Trustero application to complete activation.