{"id":17758,"date":"2017-05-19T17:55:18","date_gmt":"2017-05-19T13:55:18","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=17758"},"modified":"2021-01-26T14:43:27","modified_gmt":"2021-01-26T10:43:27","slug":"assuming-an-iam-role","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/assuming-an-iam-role\/","title":{"rendered":"Assuming an IAM Role via CloudBerry Explorer"},"content":{"rendered":"<p>CloudBerry Explorer enables users to authenticate to Amazon S3 using regular credentials. Taking things further, we've implemented support for IAM roles in the latest iteration of CloudBerry Explorer \u2014 release 5.0.5. In this article, we talk about how this mechanism functions and how to assume a role in Explorer.<br \/>\n<!--more--><\/p>\n<h2>Introduction<\/h2>\n<p>Amazon has an extremely versatile authentication mechanism. That is to say, apart from regular cloud credentials, Amazon allows to create the so-called IAM roles.\u00a0An IAM <em>role<\/em> is similar to a user, in that it is an AWS identity with permission policies that determine what the identity can and cannot do in AWS. Here how a created role looks in the AWS Console:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17772 size-large\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/awsConsole-1024x529.png\" alt=\"Create role AWS Console\" width=\"625\" height=\"323\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/awsConsole-1024x529.png 1024w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/awsConsole-300x155.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/awsConsole-768x397.png 768w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/awsConsole-624x322.png 624w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/awsConsole.png 1495w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/p>\n<p>Now let's see how you can assume the aforementioned role in CloudBerry Explorer. But before we begin, ensure that your CloudBerry Explorer is already authenticated to S3 using credentials of the user that's been assigned to the role you're trying to assume.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 70%;\">\n<div class=\"call-to-action__tag\">FREE WHITEPAPER<\/div>\n<div class=\"call-to-action__title\">Mastering AWS IAM for Amazon S3<\/div>\n<div class=\"call-to-action__text\">Learn how to effectively manage the security of your Amazon S3 account to protect your and your clients' data<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-9120adb3-1267-4129-ad5a-d8f06b87d969\" data-portal=\"5442029\" data-id=\"9120adb3-1267-4129-ad5a-d8f06b87d969\"><span class=\"hs-cta-node hs-cta-9120adb3-1267-4129-ad5a-d8f06b87d969\" id=\"hs-cta-9120adb3-1267-4129-ad5a-d8f06b87d969\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/9120adb3-1267-4129-ad5a-d8f06b87d969\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-9120adb3-1267-4129-ad5a-d8f06b87d969\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/9120adb3-1267-4129-ad5a-d8f06b87d969.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\" style=\"width: 30%;\"><img decoding=\"async\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/07\/Mastering-AWS-IAM-for-Amazon-S3.png\" alt=\"WP icon\" \/><\/div>\n<\/div>\n<h2>Role assumption<\/h2>\n<p>Assuming a role in CloudBerry Explorer is no more complicated than adding a few strings in the <em>settings<\/em> file. You can navigate to the file by going to\u00a0<em>C:\\Users\\yourUserName\\AppData\\Local\\CloudBerryLab\\CloudBerry Explorer for Amazon S3\u00a0<\/em>in Windows Explorer. Alternatively, you can locate the file via CloudBerry Explorer itself. Under Tools, click Diagnostic.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17773 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/explorer1.png\" alt=\"Role assumption\" width=\"333\" height=\"317\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/explorer1.png 333w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/explorer1-300x286.png 300w\" sizes=\"auto, (max-width: 333px) 100vw, 333px\" \/><\/p>\n<p>Click <strong>Open in Folder<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17774 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/explorer2.png\" alt=\"Diagnostic tab\" width=\"454\" height=\"596\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/explorer2.png 454w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/explorer2-229x300.png 229w\" sizes=\"auto, (max-width: 454px) 100vw, 454px\" \/><\/p>\n<p>Open the <em>settings.list<\/em> file and add the following attributes to your S3 account (placed between &lt;Settings&gt; and &lt;\/Settings&gt;):<\/p>\n<ul>\n<li>\n<div>&lt;AssumedRoleARN&gt;arn:aws:iam::Y<wbr \/>ourAccountNumber:role\/RoleName<wbr \/>&lt;\/AssumedRoleARN&gt;<\/div>\n<\/li>\n<li>\n<div>\u00a0&lt;AssumedRoleExternalId&gt;Externa<wbr \/>lId&lt;\/AssumedRoleExternalId&gt;<\/div>\n<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17776 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/settings.png\" alt=\"Open in Folder\" width=\"1019\" height=\"736\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/settings.png 1019w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/settings-300x217.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/settings-768x555.png 768w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/settings-624x451.png 624w\" sizes=\"auto, (max-width: 1019px) 100vw, 1019px\" \/><\/p>\n<p>The values for the attributes can be fetched from the AWS Console.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17777 size-large\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/awsConsole-1-1024x529.png\" alt=\"AWS Console\" width=\"625\" height=\"323\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/awsConsole-1-1024x529.png 1024w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/awsConsole-1-300x155.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/awsConsole-1-768x397.png 768w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/awsConsole-1-624x322.png 624w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/04\/awsConsole-1.png 1495w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/p>\n<p>Having done so, save the file and relaunch CloudBerry Explorer. Upon launching your role should be automatically assumed, and the permissions will be set in accordance with your role.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CloudBerry Explorer enables users to authenticate to Amazon S3 using regular credentials. Taking things further, we&#8217;ve implemented support for IAM roles in the latest iteration of CloudBerry Explorer \u2014 release 5.0.5. In this article, we talk about how this mechanism functions and how to assume a role in Explorer.<\/p>\n","protected":false},"author":69,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,898,882],"tags":[],"class_list":["post-17758","post","type-post","status-publish","format-standard","hentry","category-blog-articles","category-msp360-explorer","category-msp360-news"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/17758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/69"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=17758"}],"version-history":[{"count":0,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/17758\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=17758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=17758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=17758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}