Obtaining connection values for AWS Lambda
About this task
This topic provides instructions to obtain the connection values for AWS Lambda and to connect to App Connect.
Procedure
-
To obtain Secret access key and Access key ID (BASIC), complete the
following steps:
- Log in to your AWS account. You can choose between Root user or
IAM user based on your role.
- Root user: Account owner that performs tasks requiring unrestricted access.
- IAM user: User within an account that performs daily tasks.
An AWS-managed policy is a standalone policy that is created and administered by AWS. The following are some examples of AWS-managed policies that are specific to AWS Lambda:
- AWSLambda_FullAccess grants full access to AWS Lambda actions and other AWS services used to develop and maintain AWS Lambda resources.
- AWSLambda_ReadOnlyAccess grants read-only access to AWS Lambda resources.
- AWSLambdaRole grants permissions to invoke AWS Lambda functions.
- AmazonSNSReadOnlyAccess policy gives limited read-only access and few connector operations are accessible.
For information about AWS-managed policies that are specific to AWS Lambda, see Identity-based IAM policies for Lambda on the AWS documentation page.
- On the navigation menu, click Users.
- Select your applicable user name or account name.
- Click the Security credentials tab, and then click Create access key.
- To view the new access key, click Show.
You can retrieve the secret access key only when you create the key pair for the first time. For more information, see AWS Account and Access Keys on the AWS documentation page.
- Log in to your AWS account. You can choose between Root user or
IAM user based on your role.
- To obtain the Client ID and Client secret (BASIC OIDC), complete the following steps:
- Log in to the Microsoft Azure portal, and then click App registrations.
- In the
App registrations
page, click New registration. - In the
Register an application
page, specify a unique name for your app. - Select an option in the Supported account types section according to your
requirements.
- Click Register.
The Overview page for the application is displayed.
- Make a note of the Application (client) ID value because you need to specify it as a connection value when creating the account in App Connect.
- Next to Client credentials on the Overview page,
click Add a certificate or secret. This displays the
Certificates & secrets
page. - Click + New client secret.
- In the
Add a client secret
panel, specify a description for the secret (for example, App Connect secret) and then select an expiry period. - Click Add.
The generated client secret is displayed on the
Certificates & secrets
page. - Copy and store the client secret value because you need to specify it as a connection value when
creating the account in App Connect.Note: The client secret value won't be shown again in full after you leave this page.
- To find the Tenant ID, complete the following steps:
- Go to the Microsoft Azure portal login page, and then go to Microsoft Entra ID > Properties.
- Copy the Tenant ID value and save it somewhere safe.
For more information about obtaining the Tenant ID, see How to find your Microsoft Entra tenant ID on the Microsoft Entra Docs page.
- To obtain the Role ARN (BASIC OIDC), complete the following steps:
- Log in to your AWS Management Console for IAM account.
- Click Identity providers on the sidebar.
- Click Add provider.
The Add Identity provider page appears.
- Select OpenID Connect as the Provider type.
- In the Provider URL field, enter
https://login.microsoftonline.com/<tenant ID>/v2.0
Note: Replace<tenant ID>
with your Microsoft Azure Tenant ID value. To obtain the Tenant ID, see step 3. - In the Audience field, enter the client ID value from Microsoft Azure.
- Click Add provider.
- On the new identity provider page, click the Assign role button.
- Select Create a new role, and then click Next.
The Select trusted entity page appears.
- Select Web identity as the Trusted entity type.
- In the Identity provider field, select the required provider URL from the drop-down menu.
- In the Audience field, select the specific client ID from the drop-down menu.
- Click the Next button.
The Add permissions page appears.
- Select the appropriate permissions policies to attach to your new role.
- Click the Next button.
The Name, review, and create page appears.
- In the Role name field, enter a name for the role.
- In the Description field, enter a description for the role.
- Click the Create role button.
- On the Roles page, select the role that you created.
- Copy the ARN value (this is your Role ARN value) and save it somewhere safe.
- To generate an ID token (BASIC OIDC), see Request an access token with a client_secret on the Microsoft Entra Docs page.
- To generate a Refresh token (BASIC OIDC), see Refresh the access token on the Microsoft Entra Docs page.