Skip to content

Commit 190f6b2

Browse files
committed
DOC-375 added requested changes to the console section [netlify-build]
1 parent 0906892 commit 190f6b2

File tree

1 file changed

+26
-23
lines changed
  • src/connections/storage/catalog/aws-s3

1 file changed

+26
-23
lines changed

src/connections/storage/catalog/aws-s3/index.md

Lines changed: 26 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -39,28 +39,10 @@ To complete this section, you need access to your AWS dashboard.
3939

4040
1. Create a new S3 bucket in your preferred region. For more information, see Amazon's documentation, [Create your first S3 bucket](https://docs.aws.amazon.com/AmazonS3/latest/userguide/creating-bucket.html){:target="_blank"}.
4141
2. Create a new IAM role for Segment to assume. For more information, see Amazon's documentation, [Creating a role to delegate permissions to an IAM user](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html){:target="_blank"}.
42-
3. Attach the following trust relationship document. Be sure to add your Workspace ID to the `sts:ExternalId` field.
43-
```json
44-
{
45-
   "Version": "2012-10-17",
46-
   "Statement": [
47-
     {
48-
       "Sid": "",
49-
       "Effect": "Allow",
50-
       "Principal": {
51-
         "AWS": "arn:aws:iam::595280932656:role/segment-s3-integration-production-access"
52-
       },
53-
       "Action": "sts:AssumeRole",
54-
       "Condition": {
55-
         "StringEquals": {
56-
           "sts:ExternalId": "<YOUR_WORKSPACE_ID>"
57-
         }
58-
       }
59-
     }
60-
   ]
61-
 }
62-
```
63-
4. Create and attach the following IAM policy to the role created in step 3 above. Replace `<YOUR_BUCKET_NAME>` with the name of the bucket you created in step 1 above.
42+
1. When prompted to enter an Account ID, enter `595280932656`. (You cannot enter an ARN in this step. In step 4, you can update the `Principal` to a specific role after your IAM role has been created.)
43+
2. Click the **Require External ID** checkbox.
44+
3. In the **External ID** field, enter your Segment Workspace ID.
45+
3. Attach the following policy to the IAM role created in step 2. Replace `<YOUR_BUCKET_NAME>` with the name of the S3 bucket you created in step 1.
6446
```json
6547
{
6648
"Version": "2012-10-17",
@@ -94,8 +76,29 @@ To complete this section, you need access to your AWS dashboard.
9476
]
9577
}
9678
```
97-
9879
If you have server-side encryption enabled, see the [required configuration](#encryption).
80+
81+
4. Update `Principal` in the role’s trust relationship document to `arn:aws:iam::595280932656:role/segment-s3-integration-production-access`. Replace the `<YOUR_WORKSPACE_ID>` with your Segment Workspace ID.
82+
``` json
83+
{
84+
"Version": "2012-10-17",
85+
"Statement": [
86+
{
87+
"Sid": "",
88+
"Effect": "Allow",
89+
"Principal": {
90+
"AWS": "arn:aws:iam::595280932656:role/segment-s3-integration-production-access"
91+
},
92+
"Action": "sts:AssumeRole",
93+
"Condition": {
94+
"StringEquals": {
95+
"sts:ExternalId": "<YOUR_WORKSPACE_ID>"
96+
}
97+
}
98+
}
99+
]
100+
}
101+
```
99102

100103
### Create an IAM role using the AWS CLI
101104

0 commit comments

Comments
 (0)