AWS Credentials: Basic tab - Adaptive Applications - BlueCat Gateway - 24.1.1

Cloud Discovery & Visibility Administration Guide

Locale
English
Product name
BlueCat Gateway
Version
24.1.1

The Credentials section of the AWS Setup tab contains credentials that Cloud Discovery & Visibility uses to access your AWS infrastructure.Within the Credentials section, the Basic tab lets you specify a single account for CDV to use across your entire AWS infrastructure.

You can use either an AWS user account or credentials from the EC2 instance:

Note: To specify multiple accounts (such as different accounts for different regions), use settings in the Advanced tab. You will need to set up a text file with details about the accounts you want to use.

Fields in the Basic tab of the Credentials section are as follows:

Field/Option Description
Use EC2 instance credentials

Appears only when CDV is deployed on EC2 instances in AWS environments. Select this checkbox to tell CDV to use the credentials of the user that deployed the CDV instance in AWS for authentication in AWS environments.

Note: Selecting this checkbox hides other fields in this section.

For more details, see Setting up CDV to use EC2 instance accounts for authentication.

Basic AWS parameters

Tip: For more details on setting up a standard AWS user account for CDV, see Setting up a single AWS user account for Cloud Discovery & Visibility.
Field/Option Description
AWS Access Key ID The AWS access key ID for your environment.
AWS Secret Access Key

The AWS secret access key that is associated with the specified AWS Access Key ID.

Advanced AWS parameters

Field/Option Description
Enable AWS Role Assumption

AWS Role ARN

Select the Enable AWS Role Assumption checkbox to enable AWS role assumption. This means CDV can use a temporary set of security credentials to access AWS resources to which it normally doesn't have access.

Also, in AWS Role ARN, enter the AWS role assumption ARN. The AWS role ARN must be in the following format:

arn:aws:iam::<account_role_number>:role/<role_name>
For example:
arn:aws:iam::987654321098:role/developerRole