Skip to content

Commit cf57932

Browse files
CSOAR-3365: updated the iam-conifguration.md file
1 parent 11c5692 commit cf57932

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

docs/reuse/automation-service/aws/iam-configuration.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,11 @@ To enable AWS IAM Role-based authentication without sharing Access/Secret keys,
66

77
#### User-Side Configuration
88

9-
1. **Create an IAM Role** in AWS account.
10-
2. **Attach Required Policies** to the role depending on the AWS services they want to allow access to (e.g., `AmazonEC2ReadOnlyAccess`, `AWSWAFFullAccess`, etc.).
11-
3. **Update the Trust Policy** to allow SUMO's AWS account to assume this role.
9+
1. **[Create an IAM Role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create.html)** in your AWS account.
10+
Follow AWS’s guide to create a new IAM role that other accounts (such as Sumo Logic’s) can assume.
11+
2. **[Attach Required Policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_manage-attach-detach.html)** to the role depending on the AWS services you want to allow access to (e.g., `AmazonEC2ReadOnlyAccess`, `AWSWAFFullAccess`, etc.).
12+
3. **[Update the Trust Policy](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-custom.html)** to allow Sumo Logic’s AWS account to assume this role.
13+
This involves editing the trust relationship JSON to include Sumo’s AWS account ID as a trusted principal.
1214

1315
Example Trust Policy:
1416
```json

0 commit comments

Comments
 (0)