Loading

AWS Secrets Manager Properties Provider - Configuring AWS Assume Role with AWS Service Role in CloudHub 2.0 Private Space

Publiseringsdato: Apr 2, 2025
Forkunnskaper
AWS Secrets Manager, AWS Service Role, CloudHub 2.0 Private Space, MuleSoft Anypoint Studio, IAM role
Oppgave
How do I configure AWS Assume Role using AWS Service Role for the AWS Secrets Manager Properties Provider in CloudHub 2.0 Private Space?
Trinn
  • Enable the "AWS Service Role" on CloudHub 2.0 Private Space to generate the Role ARN. Refer to the documentation: Configure AWS Service Role
  • Access your organization’s AWS Account and either create a new role or update an existing one.
  • For this role, create an inline policy that includes two actions for "Secret Manager" and "STS Assume Role" as illustrated below:
    • The example below demonstrates a role created for Secret Manager for CloudHub 2.0 Private Space. 
    • Under the "Permissions" tab, use the "Create Inline Policy" option to create a custom policy.
    • Add the Secret Manager Role ARN as a resource for the action that allows read access to Secret Manager.
    • Add the CloudHub 2.0 Private Space Role ARN as a resource for the action that allows STS Assume Role.

  • Under the "Trust Relationships" tab, create a custom trust policy for STS Assume Role using the Role ARN copied from CloudHub 2.0 Private Space.

Note: This article is based on the original article: Use AWS Service Role in CloudHub 2.0 Private Space

Disclaimer: This article discusses products and technologies that are not part of the MuleSoft product suite. Technical assistance for these products is limited to the information provided in this article.

 
Knowledge-artikkelnummer

004630378

 
Laster
Salesforce Help | Article