To generate the required AWS credentials to use with the CloudEndure User ConsoleCloudEndure SaaS User Interface. A web-based UI for setting up, managing, and monitoring the Migration and Disaster Recovery solutions., you need to create at least one AWS Identity and Access Management (IAM) user, and assign the proper permission policy to this user. You will obtain an Access key ID and a Secret access key, which are the credentials you need to enter into the CloudEndure User ConsoleCloudEndure SaaS User Interface. A web-based UI for setting up, managing, and monitoring the Migration and Disaster Recovery solutions..
Note: As per best practices for managing AWS access keys, you should rotate IAM keys periodically. Changing IAM keys will result in replication servers recycle resulting in a temporary lag.
For detailed explanations and instructions on the creation of IAM users, refer to the AWS documentation.
The instructions below describe the necessary steps for creating an IAM user with the required policy for CloudEndure User ConsoleCloudEndure SaaS User Interface. A web-based UI for setting up, managing, and monitoring the Migration and Disaster Recovery solutions. credentials. These steps include the following:
The AWS policy you need to create for running CloudEndure solution is based on a pre-defined CloudEndure policy. This CloudEndure policy contains the necessary permissions for using AWS as your TargetThe location where the Replication Server will be located and where Target machines will be created (as a result of Test, Cutover or Recovery). infrastructure.
Important! Do not change the permissions in the CloudEndure policy without consulting AWS support. Changing the policy permissions may prevent your CloudEndure solution from running.
Note: If you do not have an AWS account, create an account by clicking the Create a new AWS account button.
Note: Customers that are migrating into the AWS China region should copy the China IAM Policy code
Note: Customers that want to launch Target machines with specified IAM Roles (that can be set through each machine's Blueprint) should manually add the iam:PassRole permission to the CloudEndure IAM Policy when entering the code into the AWS Console. The default IAM Policy provided by CloudEndure does not contain this permission.
Note: Customers that are using any GovCloud region as the Target should define the ARN within the IAM Policy as arn:aws-us-gov:ec2 instead of arn:aws:ec2
The next step is to create a new user, and then attach the policy you created to this user. During this procedure, you will be provided with an Access key ID and a Secret access key, which are the credentials you will need to enter into CloudEndure User ConsoleCloudEndure SaaS User Interface. A web-based UI for setting up, managing, and monitoring the Migration and Disaster Recovery solutions..
After creating an AWS policy which is based on CloudEndure's pre-defined policy, you will need to create a new IAM user and to attach the new policy to this user. You also need to provide this user with a Programmatic access type to enable the use of the new policy. At the end of this procedure, you will be provided with an Access key ID and Secret access key. It is important to save these values in an accessible and secured location, since they are required for running your CloudEndure solution.
Note: If you already created a group or a user with the required CloudEndure permissions, you can use one of the two other options.
Important! You need the Access key ID and Secret access key to run your CloudEndure solution. You can save these keys in a separate file for easy access by clicking the Download.cvs button. Make sure to save these values in an accessible and secure location.
©2020 COPYRIGHT CloudEndure - Terms of Service - Privacy Policy - AWS Vulnerability Reporting Guidelines - Report a Security Issue