AWS S3 - Key Access
- Create a bucket and share its name and region with Aampe.
- Grant the IAM user created by Aampe permissions to your events bucket by using the following JSON:
AWS S3 - Delegate Access
The Aampe team will provide you with a service account subject identifier.- Create a bucket and share its name and region with Aampe.
- Create an IAM policy using this JSON:
- Create a WebIdentity IAM role using this Custom JSON trust policy and the Aampe provided service account subject identifier:
AWS S3- Role Based Access.
- Customer creates their bucket and shares:
-
Bucket name (e.g.,
customer-events-bucket) -
Region (e.g.,
us-east-1) Customer Creates an IAM Policy
- Customer creates a policy with read permissions for their bucket:
AampeS3ReadAccess.
- Customer Creates an IAM Role with Cross-Account Trust
<AAMPE_AWS_ACCOUNT_ID>: AWS account ID will be provided by Aampe<EXTERNAL_ID_PROVIDED_BY_AAMPE>: Will be provided by Aampe
AampeS3AccessRole
- Customer Attaches the Policy to the Role
AampeS3ReadAccess policy (created in step 3) to the AampeS3AccessRole (created in step 4).
- Customer Shares Role ARN with Aampe
- The full role ARN (e.g.,
arn:aws:iam::987654321098:role/AampeS3AccessRole)
The Aampe team is happy to help with providing alternatives if the above is in conflict with your IT policies. Please send an email to support@aampe.com and we’ll find a solution.