| Contents |
|---|
Overview
AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
Amazon AWS IAM : Application
Steps
- Login to RSA G&L console as System Administrator.
- Navigate to Resources > Applications.
- Click on Create Application and select Other Application.
- Enter the details as shown below.
- Click Finish.
Amazon AWS IAM : Account Collector
This section explains the process for configuring an account collector for the Amazon AWS IAM application. We will use the RSA G&L out of the box collector for this purpose.\u00a0 \u00a0
Steps
- Login to RSA G&L console as System Administrator.
- Navigate to Resources > Applications.
- Click on Amazon AWS IAM.
- Navigate to Collectors tab and click on Create Account Collector. Enter the details as shown below.\n
- Click Next and enter the configuration details. Enter the proxy details if applicable to your environment. Refer to Amazon AWS IAM : Security Credentials for more information on creating the API keys.
- Click Next. The only available account attribute that can be collected is the AccountName.
- Click Next. On the mapping screen, add the AccountName as the User Reference field.
- Click Next. In the User Resolution Rules, map the user to account
- Click Next. In the Member Account Resolution Rules, map the target collector for group members.
- Click Finish. Use the Test function to make sure the configurations are accurate.
Amazon AWS IAM : Entitlement Collector
This section explains the process for configuring an entitlement collector to collect admin roles from Amazon AWS IAM application. We will use the RSA G&L out of the box collector for this purpose.
Steps
- Login to RSA G&L console as AveksaAdmin.
- Navigate to Resources > Applications.
- Click on Amazon AWS IAM.
- Navigate to Collectors tab and click on Create Entitlement Collector. Enter the details as shown below.\n
- Click Next and enter the configuration details. Enter the proxy details if applicable to your environment. Refer to Amazon AWS IAM : Security Credentials for more information on creating the API keys.
- Click Next.
- Click Next.
- Click Next.
- Click Next and then click Finish. Use the Test function to make sure the configurations are accurate.
Amazon AWS IAM : Security Credentials
This section explains the setup of security credentials for the service account that will be used with RSA G&L ADC and EDC.
Steps
- Login to AWS Identity and Access Management (IAM) console https://console.aws.amazon.com/iam/home.
- Expand Access Management and click on Policies.
- Click on Create Policy.
- Click on JSON tab and paste the below policy.
{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"VisualEditor0\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"iam:ListGroupsForUser\",\n \"iam:ListUsers\",\n \"iam:ListGroups\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d - Click on Review Policy.
- Click Create Policy.
- Repeat Steps 3 through 6 to create another policy (RSA-IGL-EDC-Policy) for EDC using the below policy definition.
{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"VisualEditor0\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"iam:ListGroupPolicies\",\n \"iam:ListAttachedRolePolicies\",\n \"iam:ListRoles\",\n \"iam:ListUserPolicies\",\n \"iam:ListRolePolicies\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d\u200d - Expand Access Management and click on Users.
- Click on Add User.
- Provide a user name for the service account and select Programmatic Access
- Click Next: Permissions
- Under Set Permissions, click on Attach existing policies directly
- Select the two (2) policies created earlier for ADC & EDC.
- Click Next:Tags.
- Click Next :Review
- Click Create User.
- Click on the newly created user and navigate to the Security Credentials tab.
- Click Create Access Key.
- Click on Download.csv file to save the Access Key and Secret Key. We will need this file during the ADC and EDC configurations in RSA IGL.
Related Articles
RSA Governance & Lifecycle Integration: Amazon AWS IAM Summary 29Number of Views AWS AFX Connector "SSLHandshakeException: Could not generate secret" error in RSA Governance & Lifecycle 44Number of Views RSA Governance & Lifecycle Integration: Amazon Web Services AWS Summary 40Number of Views AWS IAM Identity Center - SAML My Page SSO Configuration - RSA Ready Implementation Guide 6Number of Views AWS collector fails with NoClassDefFoundError 23Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle