Creating SCConnectLaunch role
This section describes how to create the
SCConnectLaunch role. This role places baseline AWS
service permissions in the AWS Service Catalog launch constraints. For more
information, refer to AWS Service Catalog
launch constraints.
The SCConnectLaunch role is an IAM role that places
baseline AWS service permissions into the AWS Service Catalog launch
constraints. Configuring this role enables segregation of duty through
provisioning product resources for Jira internal customers, Jira
agents, and end users.
The SCConnectLaunch role baseline contains
permissions to Amazon EC2 and Amazon S3 services. If your products contain
additional AWS services, you must either include those services in
the SCConnectLaunch role or create a new launch role.
To create SCConnectLaunch role
-
Create this policy:
AWSCloudFormationFullAccesspolicy and then follow the instructions in Creating IAM policies. Choose create policy and add this code in the JSON editor:Note
AWSCloudFormationFullAccessincludes additional permissions for ChangeSets. -
Create this policy:
ServicecodeCatalogSSMActionsBaselinepolicy and then follow the instructions in Creating IAM policies. Choose create policy and add this code in the JSON editor: -
Create the
SCConnectLaunchrole. Then assign the trust relationship to AWS Service Catalog using this code in the JSON editor: -
Attach the relevant policies to the
SCConnectLaunchrole.Service Management Connector recommends that you customize and scope your launch policies to the specific AWS services, which are in the associated CloudFormation template for the given Service Catalog product.
For example, to provision Amazon EC2 and Amazon S3 products, the recommended policies are as follows:
-
AmazonEC2FullAccess(AWS managed policy) -
AmazonS3FullAccess(AWS managed policy) -
AWSCloudFormationFullAccess(custom managed policy) -
ServiceCatalogSSMActionsBaseline(custom managed policy)
-