Loading

AWS Secrets Manager Properties Provider - Configuring AWS Assume Role with AWS Service Role in CloudHub 2.0 Private Space

Date de publication: Apr 2, 2025
Prérequis
AWS Secrets Manager, AWS Service Role, CloudHub 2.0 Private Space, MuleSoft Anypoint Studio, IAM role
Tâche
How do I configure AWS Assume Role using AWS Service Role for the AWS Secrets Manager Properties Provider in CloudHub 2.0 Private Space?
Étapes
  • Enable the "AWS Service Role" on CloudHub 2.0 Private Space to generate the Role ARN. Refer to the documentation: Configure AWS Service Role
  • Access your organization’s AWS Account and either create a new role or update an existing one.
  • For this role, create an inline policy that includes two actions for "Secret Manager" and "STS Assume Role" as illustrated below:
    • The example below demonstrates a role created for Secret Manager for CloudHub 2.0 Private Space. 
    • Under the "Permissions" tab, use the "Create Inline Policy" option to create a custom policy.
    • Add the Secret Manager Role ARN as a resource for the action that allows read access to Secret Manager.
    • Add the CloudHub 2.0 Private Space Role ARN as a resource for the action that allows STS Assume Role.

  • Under the "Trust Relationships" tab, create a custom trust policy for STS Assume Role using the Role ARN copied from CloudHub 2.0 Private Space.

Note: This article is based on the original article: Use AWS Service Role in CloudHub 2.0 Private Space

Disclaimer: This article discusses products and technologies that are not part of the MuleSoft product suite. Technical assistance for these products is limited to the information provided in this article.

 
Numéro d’article de la base de connaissances

004630378

 
Chargement
Salesforce Help | Article