AWS CloudFormation Stack - for Integrating Individual Accounts

Ariel Zaretsky
Ariel Zaretsky
  • Updated

Individual account integration workflow

AWS_Individual_Account_Integration_Workflow.png

Note: Only an AWS admin can create a role that can access connected Authomize accounts.

Open both Authomize and AWS

  • Log into Authomize and AWS in separate windows.
  • In AWS you must have permissions to run CloudFormation and create new roles.
Authomize_Login.png 3a_AWS_Sign_In.png

Preparing the AWS Integration in Authomize

  1. Go to Settings > Data Sources.
  2. If AWS appears under Recommended Apps, click it. Otherwise, Click Add New App.
    1_Recommended_Ap.png
  3. Select AWS.
    1b_Recommended_Ap.png

Note: AWS IAM Identity Center (old AWS SSO) will be installed alongside AWS when the “include SSO parameter” is set in AWS.

  1. When the Integrate AWS dialog appears, click CloudFormation_Installation_Button.png.
    If you do not have CloudFormation and Role creation privileges, send the link (along with a request to create an Authomize-Trust-Role) to your AWS admin.

Note: You can complete the Integrate AWS dialog after an Authomize-Trust-Role is available on AWS.

Creating an Authomize-Trust-Role on AWS

Authomize communicates with AWS through an Authomize account (on AWS) with an Authomize-Trust-Role.
Follow the steps below to create an account and an Authomize-Trust-Role.

    1. If you are already logged into AWS, the CloudFormation>Stacks>Create stack dialog will open in AWS after clicking on its link (CloudFormation_Installation_Button.png).
      7_AWS_Quick_Create_Stack-with-data.png

Fill in the fields as follows:

Template:

  • The Template URL is entered automatically. It is:
    https://authomize-cloud-formation.s3.amazonaws.com/authomize_cloud_formation.json

Stack name:

  • Authomize-Trust-Role entered automatically

Parameters:

  • ExternalID entered automatically
    (Do not change ID as the integration will not work)
  • Set IncludeAWSIdentityCenter to true (so that AWS SSO will be integrated and installed alongside AWS).

Capabilities:

  • Acknowledge that AWS Cloud-Formation might create IAM resources with custom names.

2. Click Create_Stack_Button.png

  1. In CloudFormation/Stacks/Authomize-Trust-Role, check to see if the stack creation was completed.
    8_AWS_Stacks.png
  2. Copy the Account number from the account number next to your name on the Menu bar.
    8a_Account_Number.png

Complete the Integration

In the Integrate AWS dialog:

     4. Skip step 4 if you used CloudFormation,
         otherwise insert the AccessKeyId and SecretAccessKey (for legacy integration).
         10c_Integrate_AWS.png

   5. Insert the Account Number (copied from the AWS menu bar, as described above).
       Insert the Management Account number only if you want to integrate the AWS Identity Center. 
       This assumes:
            - the role is installed on the management account
            - the role includes AWS Identity Center permission. 
        If you insert a Management Account, that account number must be included
        (in comma delimited format) in the Account Number field. 
       Skip the Assumed Role.

        If you leave the Regions field empty, all regions (in your organization) will be included.
        If you specify one or more regions, data will be fetched only from those regions.
       

10b_Create_Integration.png

      6. Enter an Integration name.
      7. Enter Owner’s email.

         10X_Integrate_AWS.png

Click Create_Button.png  

If all goes well, you will see this:

14_Auth_all_Set.png
Notice that AWS and AWS SSO were added to your Connected Apps.

AWS IAM Identity Center

The AWS IAM Identity Center (previously known as AWS SSO) is an authentication solution that allows users to log in to multiple applications and websites with one-time user authentication.

  • It is integrated with Authomize alongside AWS , when IncludeAWSIdentityCenter is set to true in the Specify StackSet Details page. It is only relevant if your organization uses IAM Identity Center (AWS SSO)
  • If installed on an individual account, only mark as true in the management account.
  • When checking this option Authomize requests two extra permissions:
    AWSSSOReadOnly,
    AWSSSODirectoryReadOnly
Share this

Was this article helpful?

0 out of 0 found this helpful