This page outlines the steps to enable AWS Integration with Zilla. We will be using the Delegate access across AWS accounts using IAM roles tutorial as a guide to allow you to delegate access of your AWS account to Zilla’s AWS account using AWS IAM Roles.
Bring in IAM Users and Groups into Zilla
To bring in IAM Users and Groups of an AWS Account, you need to create an IAM Role and attach an IAM Policy to it.
Create an IAM
...
Policy for IAM Users and Groups
Steps to create an IAM RolePolicy
Login to the AWS Account via the AWS Management Console
Enter your 12-digit account number. Click
Next
and then enter your username and password to login.Once you are logged in, you will land on the home page with a search bar on at the top.
On In the search bar on top, search for IAM and click on the search result called IAM as shown below.
You will be redirected to the IAM dashboard.
Before creating a role, we will first create a policy that will be assigned to the role. For that click on Click
Policies
on the left hand side menu.Click on
Create policy
and then click on theJSON
tab.If you want to get just IAM users, enter IAM Policy Creation: Enter the following
json
snippet and click on nextNext Tags
. Replace<YOUR_AWS_ACCOUNT_ID>
with your 12 digit AWS Account ID. The following policy allows Zilla to read the IAM Users and Groups information from your AWS account languageCode Block json { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": "iam:GetGroup", "Resource": "arn:aws:iam::<YOUR_AWS_ACCOUNt_ID>:group/*" }, { "Sid": "VisualEditor1", "Effect": "Allow", "Action": "iam:GetAccountAuthorizationDetails", "Resource": "*" } ] }
For both SSO and IAM Users, enter the following and click on next. Replace
<YOUR_AWS_ACCOUNT_ID>
with your 12 digit AWS Account ID.Optionally add tags and click
Next: Review
.Review Policy: On the review page, enter the Name (
Zilla-IAM-Reader-Policy
) and optionally a description for the policy. Review the permissions assigned to the policy and then clickCreate policy
The policy will look like this:You will see a success message that the policy has been created.
To confirm that the policy is present, you can search for it in the policy search bar. You will see your newly added policy in the list.
Click on the policy
Zilla-IAM-Reader-Policy
to double check the assigned permissions. The policy will look like this:Click on the
{} JSON
tab to double check the policy json.(Account ID redacted from screenshot)
Now that you have created the policy, the next step is to create a cross account Role.
Create an IAM Role for IAM Users and Groups
Steps to create an IAM Role
Click on
Roles
from the left hand side menu to begin then clickCreate role
button to create a new IAM Role.Under
Select type of trusted entity
selectAnother AWS account
and enter the 12 digit Account ID of Zilla (087210011007). ClickNext: Permissions
.On the permissions page, search for the policy created ,
Zilla-IAM-Reader-Policy
, and select the checkbox. ClickNext: Tags
.Optionally add tags and click
Next: Review
.On the review page, add the name of the role
Zilla-IAM-Reader-Role
and optionally add a description. Review the trusted entity account id matches Zilla’s account Id (087210011007) and that thePolicies
section containsZilla-IAM-Reader-Policy
. ClickCreate role
.Once the role is created, you can search for it on the roles tab and click on the role to check its details.
On the role details page, double check the policy under
Permissions
andTrusted entities
has Zilla Account ID (087210011007) underTrust relationships
.
Info |
---|
Notes:
|
Bring SSO Users, Groups and Permission Sets into Zilla
Create an IAM Policy for SSO Users, Groups and Permission Set
Steps to create an IAM Policy
Click on
Policies
on the left hand side menu of the IAM Dashboard.Click
Create policy
and click on theJSON
tab.IAM Policy Creation: Enter the following
json
snippet and clickNext: Tags
. The following policy allows Zilla to read the SSO Users, Groups and Permission Sets information from your AWS accountCode Block { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": [ "sso:ListAccountAssignments", "sso:ListPermissionSetsProvisionedToAccount", "sso:DescribePermissionSet", "iam:GetGroup" ], "Resource": [ "arn:aws:iam::<YOUR_AWS_ACCOUNT_ID>:group/*", "arn:aws:sso:::instance/*", "arn:aws:sso:::permissionSet/*/*", "arn:aws:sso:::account/*" ] }, { "Sid": "VisualEditor1", "Effect": "Allow", "Action": [ "identitystore:DescribeUser", "identitystore:DescribeGroup", "iam:GetAccountAuthorizationDetails" ], "Resource": "*" } ] }
Optionally add tags and click next
Next: Review
.Review Policy: On the review page, enter the name Name (
Zilla-IAMSSO-Reader-Policy
) and optionally a description for the policy. Review the permission permissions assigned to the policy and then click onCreate policy
. The policywill look like this:
You will see a success message like this:
To confirm that the policy is present, you can search for it in the policy search bar. You will see your newly added policy in the list.
Click on the policy
Zilla-IAMSSO-Reader-Policy
to double check the assigned permissions. The policy will look like this:
Click on the
{} JSON
tab to double check the policy json.(Account ID redacted from screenshot)
Now that you have created the
...
policy, the next step is to create a cross account Role.
...
Create an IAM Role for SSO Users, Groups and Permission Set
Steps to create an IAM Role
Click
Roles
from the left hand side menu to begin.Click on
Create Rolerole
button to create a new IAM Role. 1st step is to UnderSelect type of trusted entity
Select selectAnother AWS Accountaccount
and enter the 12 digit Account ID of Zilla (087210011007) and then click on next.Next: Permissions
.On the permissions page, search for the policy we created ,
Zilla-IAMSSO-Reader-Policy
, and the select the checkbox. Then click nextNext: Tags
.Optionally add tags . Click nextand click
Next: Review
.On the review page, add the name of the role
Zilla-IAMSSO-Reader-Role
and optionally add a description. Review the trusted entity account id matches Zilla’s account Id (087210011007) and that the policies hasPolicies
section containsZilla-IAMSSO-Reader-Policy
, then click onCreate role
.Once the role is created, you can search for it on the roles tab and click on the role to check its details.
On the role details page, double check the policy under permissions
Permissions
and trusted entityTrusted entities
has Zilla Account ID (087210011007) under trustedTrust relationships
.Once everything looks good, copy
Info |
---|
Notes:
|
Things to keep handy
For IAM Users and Groups: Copy the Role ARN. For eg:
arn:aws:iam::<YOUR_AWS_ACCOUNT_ID>:role/Zilla-IAM-Reader-Role
created above.For SSO Users and Groups:, you need to keep the following things handy:
Copy the SSO Role ARN of your Master AWS Account. For eg:
arn:aws:iam::<YOUR_AWS_SSO_MASTER_ACCOUNT_ID>:role/Zilla-SSO-Reader-Role
created above
ARN of the SSO Instance
Identity Store Id of the Identity Provider of SSO Instance
12 digit Account ID of the AWS Instance for which you want to bring in SSO Users and Groups
AWS Region under which AWS SSO is setup
AWS SCIM Endpoint
AWS SCIM Access Token
Here are the instructions to get the above details:
In the search bar at the top, search for AWS SSO and click on the search result called
AWS Single Sign-On
as shown below.You will land on the AWS SSO dashboard.
Click the
Settings
option on the left menu.Copy the
ARN
of the SSO Instance and keep it handy. It will look something like this:arn:aws:sso:::instance/ssoins-<SOME_ALPHANUMERIC_ID>
.Also, copy the
Identity store ID
. It will look something like this:d-<SOME_NUMBERS>
.Next, click the
AWS accounts
option from the left menu.Copy the 12 digit Account Id of the AWS Account whose
Permission sets
assignments you want to get.Copy the region in which the AWS SSO Organization has been created. For eg:
us-east-1
.Go back to
Settings
to get the Automatic Provisioning (SCIM) detailsYou can only get the SCIM details if Automatic Provisioning is enabled. You can choose to keep Automatic Provisioning disabled or choose to enable at this point. If Automatic Provisioning is disabled, Zilla won’t be able to track the
Active Status
of a user.To enable Automatic Provisioning, click
Enable automatic provisioning
.Copy the SCIM Endpoint and keep it handy.
Click
Show token
and copy the token. Note that this token is available to be copied only once.
Set up AWS Application Integration on Zilla
Go Login to Zilla at http://app.zillasecurity.com/ and follow the sign in to your Zilla account or if you are a first time user, sign up .
Once you are signed in, you will land on the application
Applications
page.Click on
Add Application
. You will see a library of all applications listed here which are supported by Zilla.You can search for application using
Type “aws” into the search bar . Type
aws
here to filter the results.Click on
Add Applicationto Applications
next to theAmazon Web Services
entry. You will see a dialog box appear.All the fields are optional. Click on
Add to Applications
.You will be redirected back to the Applications page and you will see the
Amazon Web Services
entry included in therethe list.Next, click on the application to configure its integration.
Click on
Update
button on theSync Now
link in the top right corner. You will see a dialog box appear.Click on the toggle button under
API Integration
to enable the integrationAPI Integration.Now, enter Enter the
RoleArn
values you copied for theZilla-IAM-Reader-Role
in step #20 above and paste it in the textbox here and save. This is required for Zilla to recognize the AWS Account from which to bring in the users.Optionally, for SSO, you can find the
Identity Store Id
andSSO Instance ARN
under the AWS SSO Service.Account Id
is the same as<YOUR_AWS_ACCOUNT_ID>
from the
Things to keep handy
section above and clickNext
.Click
Next
again.Your sync will startbegin. Once it completes, you will see the below message.
Click
Done
. You will then see a message like this if the sync completed successfully.You can close the message dialog and navigate to the Accounts tab to the IAM Users from your AWS account.
Next, click on the permissions
Permissions
tab to browse the permissionPermission
assigned to each user.
Include Page | ||||
---|---|---|---|---|
|