Add AWS accounts via the Cloudcraft API

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Cloudcraft currently doesn’t offer a way to add multiple AWS accounts at once using the web interface, but you can do so via the API.

The ability to add and scan AWS accounts, as well as to use Cloudcraft's developer API, is only available to Pro subscribers. Check out Cloudcraft's pricing page for more information.

Prerequisites

Before you begin, make sure you have the following:

  • A Cloudcraft user with the Owner or Administrator role.
  • An active Cloudcraft Pro subscription.
  • An AWS account with permission to create IAM roles.
  • A Unix-like environment, such as Linux, macOS, or WSL on Windows with cURL and the AWS CLI installed.
  • A basic understanding of the command-line interface.
  • A basic understanding of how to use APIs.

Getting the AWS IAM role parameters

Start by using the Get my AWS IAM Role parameters endpoint of Cloudcraft’s API and saving the response.

To accomplish this, open the command line and enter the following cURL command:

curl \
  --url 'https://api.cloudcraft.co/aws/account/iamParameters' \
  --tlsv1.2 \
  --proto '=https' \
  --compressed \
  --silent \
  --header "Authorization: Bearer ${API_KEY}"

Replace API_KEY with your Cloudcraft API key. The response should look something like this:

cloudcraft-response.json

{
  "accountId": "1234567890",
  "externalId": "ex53e827-a724-4a2a-9fec-b13761540785",
  "awsConsoleUrl": "https://console.aws.amazon.com/iam/home?#/roles..."
}

Save a copy of the accountId and externalId fields, as you’ll need them when creating the IAM role in the next step.

Creating the IAM role

Next, use the create-role command in the AWS CLI to create the IAM role.

aws iam create-role \
  --role-name 'cloudcraft' \
  --description 'Programmatically created IAM role for use with Cloudcraft.' \
  --max-session-duration '3600' \
  --assume-role-policy-document '{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Principal":{"AWS":"arn:aws:iam::ACCOUNT_ID:root"},"Action":"sts:AssumeRole","Condition":{"StringEquals":{"sts:ExternalId":"EXTERNAL_ID"}}}]}' \
  --query 'Role.Arn' \
  --output 'text'

Replace ACCOUNT_ID and EXTERNAL_ID with the values you got in the previous step.

If successful, a response with the role’s account ARN is displayed. Save this value for later.

However, the role has no permission attached to it yet. To connect the ReadOnlyAccess role, use the attach-role-policy command in the AWS CLI.

aws iam attach-role-policy \
  --role-name 'cloudcraft' \
  --policy-arn 'arn:aws:iam::aws:policy/ReadOnlyAccess'

Note: If you gave the role a different name in the previous step, make sure you replace cloudcraft with the name you used.

Adding the AWS account to Cloudcraft

Finally, once you’ve created the IAM role, you can add the AWS account to Cloudcraft. You can do that by using the ARN of the role you created and calling Cloudcraft’s developer API.

curl \
  --url 'https://api.cloudcraft.co/aws/account' \
  --tlsv1.2 \
  --proto '=https' \
  --silent \
  --header 'Content-Type: application/json' \
  --header "Authorization: Bearer ${API_KEY}" \
  --data-raw '{"name":"AWS_ACCOUNT_NAME","roleArn":"ROLE_ARN","region":"us-east-1"}' \

Replace AWS_ACCOUNT_NAME with the name you want the account to have in Cloudcraft and ROLE_ARN with the ARN of the role you created in the previous step. You must also replace us-east-1 with the region you want the account to be checked from, and API_KEY with your API key.

After you successfully add the account, you can use the same command to add additional accounts to Cloudcraft.

PREVIEWING: may/unit-testing