Manage access to AWS Support case creation and management in re:Post Private
You must create an AWS Identity and Access Management (IAM) role to manage access to AWS Support case creation and management from AWS re:Post Private. This role performs the following AWS Support actions for you:
After you create the IAM role, attach an IAM policy to this role so that the role has the required permissions to complete these actions. You choose this role when you create your private re:Post in the re:Post Private console.
Users in your private re:Post have the same permissions that you grant to the IAM role.
Important
If you change the IAM role or the IAM policy, then your changes apply to the private re:Post that you configured.
Follow these procedures to create your IAM role and policy.
Topics
Use an AWS managed policy or create a customer managed policy
To grant your role permissions, you can use either an AWS managed policy or a customer managed policy.
Tip
If you don't want to create a policy manually, then we recommend that you use an AWS managed policy instead and skip this procedure. Managed policies automatically have the required permissions for AWS Support. You don't need to update the policies manually. For more information, see AWS managed policy: AWSRepostSpaceSupportOperationsPolicy.
Follow this procedure to create a customer managed policy for your role. This procedure uses the JSON policy editor in the IAM console.
To create a customer managed policy for re:Post Private
Sign in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com/iam/
. -
In the navigation pane, choose Policies.
-
Choose Create policy.
-
Choose the JSON tab.
-
Enter your JSON, and then replace the default JSON in the editor. You can use the example policy.
-
Choose Next: Tags.
-
(Optional) You can use tags as key–value pairs to add metadata to the policy.
-
Choose Next: Review.
-
On the Review policy page, enter a Name, such as
, and a Description (optional).rePostPrivateSupportPolicy
-
Review the Summary page to see the permissions that the policy allows, and then choose Create policy.
This policy defines the actions that the role can take. For more information, see Creating IAM policies (console) in the IAM User Guide.
Example IAM policy
You can attach the following example policy to your IAM role. This policy allows the role to have full permissions to all required actions for AWS Support. After you configure a private re:Post with the role, any user in your private re:Post has the same permissions.
{ "Version": "2012-10-17", "Statement": [ { "Sid": "RepostSpaceSupportOperations", "Effect": "Allow", "Action": [ "support:AddAttachmentsToSet", "support:AddCommunicationToCase", "support:CreateCase", "support:DescribeCases", "support:DescribeCommunications", "support:ResolveCase" ], "Resource": "*" } ] }
Note
For a list of AWS managed policies for re:Post Private, see AWS managed policies for AWS re:Post Private.
You can update the policy to remove a permission from AWS Support.
For descriptions for each action, see the following topics in the Service Authorization Reference:
Create an IAM role
After you create the policy, you must create an IAM role, and then attach the policy to that role. You choose this role when you create a private re:Post in the re:Post Private console.
To create a role for AWS Support case creation and management
Sign in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com/iam/
. -
In the navigation pane, choose Roles, and then choose Create role.
-
For Trusted entity type, choose Custom trust policy.
-
For Custom trust policy, enter the following:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "repostspace.amazonaws.com" }, "Action": [ "sts:AssumeRole", "sts:SetSourceIdentity" ] } ] }
-
Choose Next.
-
Under Permissions policies, in the search bar, enter the AWS managed policy or a customer managed policy that you created, such as
. Select the check box that's next to the permissions policies that you want the service to have.rePostPrivateSupportPolicy
-
Choose Next.
-
On the Name, review, and create page, for Role name, enter a name, such as
.rePostPrivateSupportRole
-
(Optional) For Description, enter a description for the role.
-
Review the trust policy and permissions.
-
(Optional) You can use tags as key–value pairs to add metadata to the role. For more information about using tags in IAM, see Tagging IAM resources.
-
Choose Create role. You can now choose this role when you configure a private re:Post in the re:Post Private console. See Create a new private re:Post.
For more information, see Creating a role for an AWS service (console) in the IAM User Guide.
Troubleshooting
See the following topics to manage access to re:Post Private.
Contents
I want to restrict specific users in my private re:Post from specific actions
By default, users in your private re:Post have the same permissions specified in the IAM policy that you attach to the IAM role that you create. This means that anyone in the private re:Post has read or write access to create and manage AWS Support cases, whether or not they have an AWS account or an IAM user.
We recommend the following best practices:
-
Use an IAM policy that has the minimum required permissions to the AWS Support. See AWS managed policy: AWSRepostSpaceSupportOperationsPolicy.
When I configure a private re:Post, I don't see the IAM role that I created
If your IAM role doesn't appear in the IAM role for re:Post Private; list, this means that the role doesn't have re:Post Private as a trusted entity, or that the role was deleted. You can update the existing role, or create another one. See Create an IAM role.
My IAM role is missing a permission
The IAM role that you create for your private re:Post needs permissions to perform
the actions that you want. For example, if you want your users in the private re:Post to create
support cases, the role must have the support:CreateCase
permission.
re:Post Private assumes this role to perform these actions for you.
If you receive an error about a missing permission for AWS Support, verify that the policy attached to your role has the required permission.
See the previous Example IAM policy.
An error says that my IAM role isn't valid
Verify that you chose the correct role for your private re:Post configuration.