Skip to content

Commit 4d5dfea

Browse files
committed
Updates from review
1 parent 11e6ac6 commit 4d5dfea

File tree

9 files changed

+29
-27
lines changed

9 files changed

+29
-27
lines changed

docs/platform-services/automation-service/app-central/integrations/aws-cloudtrail.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,12 @@ import IAMConfiguration from '../../../../reuse/automation-service/aws/iam-confi
5555

5656
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/aws/aws-cloudtrail-configuration.png')} style={{border:'1px solid gray'}} alt="AWS CloudTrail configuration" width="400"/>
5757

58+
For information about AWS CloudTrail, see [CloudTrail documentation](https://docs.aws.amazon.com/cloudtrail/).
59+
5860
<IntegrationsAuthAWS/>
5961

62+
### AWS IAM role-based access
63+
6064
<IAMConfiguration/>
6165

6266
## Required Permissions
@@ -70,8 +74,6 @@ import IAMConfiguration from '../../../../reuse/automation-service/aws/iam-confi
7074
cloudtrail:UpdateTrail
7175
```
7276

73-
For information about AWS CloudTrail, see [CloudTrail documentation](https://docs.aws.amazon.com/cloudtrail/).
74-
7577
## Change Log
7678

7779
* October 1, 2019 - First upload

docs/platform-services/automation-service/app-central/integrations/aws-route53.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,12 +52,13 @@ import IAMConfiguration from '../../../../reuse/automation-service/aws/iam-confi
5252

5353
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/aws/aws-route53-configuration.png')} style={{border:'1px solid gray'}} alt="AWS Route 53 configuration" width="400"/>
5454

55+
For information about AWS Route 53, see [Route 53 documentation](https://docs.aws.amazon.com/route53/).
56+
5557
<IntegrationsAuthAWS/>
5658

59+
### AWS IAM role-based access
5760
<IAMConfiguration/>
5861

59-
For information about AWS Route 53, see [Route 53 documentation](https://docs.aws.amazon.com/route53/).
60-
6162
## Change Log
6263

6364
* December 24, 2019 - First upload

docs/platform-services/automation-service/app-central/integrations/aws-s3.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,8 @@ import IAMConfiguration from '../../../../reuse/automation-service/aws/iam-confi
5858

5959
<IntegrationsAuthAWS/>
6060

61+
### AWS IAM role-based access
62+
6163
<IAMConfiguration/>
6264

6365
## Required Permissions

docs/platform-services/automation-service/app-central/integrations/aws-simple-notification-service.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,11 +50,13 @@ import IAMConfiguration from '../../../../reuse/automation-service/aws/iam-confi
5050

5151
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/misc/aws-simple-notification-service-configuration.png')} style={{border:'1px solid gray'}} alt="AWS Simple Notification Service configuration" width="400"/>
5252

53+
For information about Amazon Simple Notification Service, see [Amazon Simple Notification Service documentation](https://docs.aws.amazon.com/sns/).
54+
5355
<IntegrationsAuthAWS/>
5456

55-
<IAMConfiguration/>
57+
### AWS IAM role-based access
5658

57-
For information about Amazon Simple Notification Service, see [Amazon Simple Notification Service documentation](https://docs.aws.amazon.com/sns/).
59+
<IAMConfiguration/>
5860

5961
## External Libraries
6062

docs/platform-services/automation-service/app-central/integrations/aws-sqs.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,8 +51,12 @@ import IAMConfiguration from '../../../../reuse/automation-service/aws/iam-confi
5151

5252
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/aws/aws-sqs-configuration.png')} style={{border:'1px solid gray'}} alt="AWS SQS configuration" width="400"/>
5353

54+
For information about AWS SQS, see [SQS documentation](https://docs.aws.amazon.com/sqs/).
55+
5456
<IntegrationsAuthAWS/>
5557

58+
### AWS IAM role-based access
59+
5660
<IAMConfiguration/>
5761

5862
## Required Permissions
@@ -65,8 +69,6 @@ import IAMConfiguration from '../../../../reuse/automation-service/aws/iam-confi
6569
sqs:SendMessage
6670
```
6771

68-
For information about AWS SQS, see [SQS documentation](https://docs.aws.amazon.com/sqs/).
69-
7072
## Change Log
7173

7274
* January 16, 2020 - First upload

docs/platform-services/automation-service/configure-authentication-for-integrations.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ description: Learn how to configure authentication for automation integrations.
66
---
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
9+
import IAMConfiguration from '../../reuse/automation-service/aws/iam-configuration.md';
910

1011
This article provides a quick reference to configure authentication for [automation integrations in App Central](/docs/platform-services/automation-service/app-central/integrations/) for the Automation Service and Cloud SOAR. Refer to the individual integrations articles for detailed information on setup, usage, and features.
1112

@@ -119,7 +120,9 @@ For AWS service endpoints information, see [AWS documentation](https://docs.aws.
119120

120121
#### Authentication method
121122

122-
AWS recommends using IAM roles with temporary security credentials over long-term access keys for enhanced security. However, our AWS integrations currently support only access keys due to the need for dynamically managed credentials.
123+
AWS recommends using IAM roles with temporary security credentials over long-term access keys for enhanced security.
124+
125+
<IAMConfiguration/>
123126

124127
#### Regional configuration
125128

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
**Access Key ID**. Enter an AWS [access key ID](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html) to provide authentication. (Although AWS recommends using IAM roles with temporary security credentials instead of access keys)
1+
**Access Key ID**. Enter an AWS [access key ID](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html) to provide authentication. (Although AWS recommends using IAM roles with temporary security credentials instead of access keys.)
Lines changed: 6 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,8 @@
1-
### AWS IAM Role-Based Access Guide
2-
3-
To enable AWS IAM Role-based authentication without sharing Access/Secret keys, follow the steps below.
4-
5-
---
6-
7-
#### User-Side Configuration
8-
9-
1. **[Create an IAM Role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create.html)** in your AWS account.
10-
Follow AWS’s guide to create a new IAM role.
11-
2. **[Attach Required Policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_manage-attach-detach.html)** to the role depending on the AWS services you want to allow access to (e.g., `AmazonEC2ReadOnlyAccess`, `AWSWAFFullAccess`, etc.).
12-
3. **[Update the Trust Policy](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-custom.html)** to allow Sumo Logic’s AWS account to assume this role.
13-
This involves editing the trust relationship JSON to include Sumo’s AWS account ID as a trusted principal.
14-
15-
Example Trust Policy:
1+
To enable AWS IAM role-based authentication without sharing access keys and secrets, follow the steps below:
2+
1. [Create an IAM role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create.html) in your AWS account. Follow AWS’s guide to create a new IAM role.
3+
2. [Attach required policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_manage-attach-detach.html) to the role depending on the AWS services you want to allow access to (for example, `AmazonEC2ReadOnlyAccess`, `AWSWAFFullAccess`, etc.).
4+
3. [Update the trust policy](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-custom.html) to allow Sumo Logic’s AWS account to assume this role. This involves editing the trust relationship JSON to include Sumo Logic’s AWS account ID as a trusted principal.
5+
Example trust policy:
166
```json
177
{
188
"Version": "2012-10-17",
@@ -26,4 +16,4 @@ To enable AWS IAM Role-based authentication without sharing Access/Secret keys,
2616
}
2717
]
2818
}
29-
```
19+
```
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
**IAM Role**. Enter an AWS IAM Role ARN to provide authentication. See the AWS IAM documentation on [identifiers including ARNs](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html) for more information.
1+
**IAM Role**. Enter an AWS IAM Role ARN to provide authentication. See the AWS documentation on [IAM identifiers](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html) for more information.

0 commit comments

Comments
 (0)