Setting Up IAM Users to Access Workbench-ExecutionRole
This guide provides step-by-step instructions to configure IAM users to assume the Workbench-ExecutionRole
in your AWS account.
Prerequisites
- Administrator permissions to update IAM users and policies.
- The
Workbench-ExecutionRole
must already be deployed via the Workbench AWS CDK stack.
Steps to Update IAM User Permissions
1. Log in to the AWS Management Console
- Navigate to the IAM Console.
2. Select the IAM User
- In the left-hand menu, select Users.
- Locate and select the IAM user who needs access to the
Workbench-ExecutionRole
.
3. Attach an Inline Policy
- Navigate to the Permissions tab for the IAM user.
- Click Add inline policy.
-
Select the JSON editor and paste the following policy:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "sts:AssumeRole", "Resource": "arn:aws:iam::<account-id>:role/Workbench-ExecutionRole" } ] }
- Replace
<account-id>
with your AWS account ID.
- Replace
-
Review and save the policy.
Verifying Access for IAM Users
- Log in to the AWS Management Console as the IAM user.
-
Use the following CLI command to test access:
aws sts assume-role \ --role-arn arn:aws:iam::<account-id>:role/Workbench-ExecutionRole \ --role-session-name TestSession
- Replace
<account-id>
with your AWS account ID.
- Replace
-
If successful, you will receive temporary credentials for the
Workbench-ExecutionRole
.
Troubleshooting
Common Issues
- Permission Denied: Ensure the correct inline policy is attached to the IAM user.
- Role Not Found: Verify that the
Workbench-ExecutionRole
has been deployed correctly.
Contact Support
If you encounter issues, please contact your AWS administrator or reach out to the Workbench support team.