Obtaining connection values for Amazon EventBridge
About this task
This topic provides instructions to obtain the connection values for Amazon EventBridge and to connect to App Connect.
Procedure
-
To obtain the Secret access key and Access key ID values (BASIC) without
using the Role-Based Access Control (RBAC) model (without using Role ARN), complete the following
steps:
-
Log in to your AWS account.
You can choose between Root user or IAM user depending on your role.- Root user: The account owner that performs tasks requiring unrestricted access.
- IAM user: A user within an account that performs daily tasks.
AWS recommends using identity-based managed policies to attach permission sets and roles to an identity and grant only the permissions the user needs. These policies control what actions that identity can perform, on which resources, and under what conditions. While setting the permissions for an identity in IAM, you can decide whether to use an AWS-managed policy, a customer-managed policy, or an inline policy.
An AWS-managed policy is a stand-alone policy that is created and administered by AWS. The following are some examples of AWS-managed policies that are specific to Amazon EventBridge:
- AmazonEventBridgeFullAccess policy provides full access to Amazon EventBridge service and all connector operations are accessible.
- AmazonEventBridgeReadOnlyAccess policy gives limited read-only access, and few connector operations are accessible.
For more information about AWS-managed policies that are specific to Amazon EventBridge, see the AWS managed policies list on the AWS documentation page.
- On the navigation menu, click Users.
- Select the IAM user for whom you want to generate credentials.
If the user does not exist, click Create user, assign a username, and attach the appropriate policies.
- Click the Security credentials tab, and then click Create access key.
- Choose the appropriate use case.
- Click Next, then Create access key.
- To view the Secret access key value, click Show.
- Copy the Access key (Access key ID) and Secret access
key values and save them somewhere safe. You can retrieve the secret access key only
when you create the key pair for the first time.
For detailed information, see Manage access keys for IAM users on the AWS documentation page.
-
- To obtain the Secret access key and Access key ID values (BASIC)
by using the RBAC model (with Role ARN), complete the following steps:
- Log in to your AWS Management Console for IAM account.
- Click Roles on the sidebar.
- Click the Create role button.
- For Trusted entity type, select:
- AWS service if the connector is in the same AWS account.
- Another AWS account if the connector is in a different AWS account.
- Under Add permissions, choose predefined policies or create a custom policy with required specific permissions.
- Click the Next button.
- In the Role name field, enter a name for the role.
- Click the Create role button.
- On the Roles page, select the role that you created.
- Copy the ARN value (this is your Role ARN value) and save it somewhere safe.
- Click Policies on the sidebar.
- Click the Create policy button.
- For Policy editor, select the JSON tab and enter
the following policy:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "AllowAssumeRole", "Effect": "Allow", "Action": "sts:AssumeRole", "Resource": "arn:aws:iam::<awsaccountnumber>:role/<rolename>" } ] }- Replace
<awsaccountnumber>with your AWS account number. - Replace
<rolename>with the name of the role that you created in the previous step.
- Replace
- Click the Next button.
- In the Policy name field, enter a name for the policy.
- Click the Create policy button.
- Click Users on the sidebar.
- Click the Create user button.
- In the User name field, enter a name for the user.
- Click the Next button.
- Under Permissions options, select Attach policies directly.
- Select the policy that you created.
- Click the Next button.
- Click the Create user button, then select the user that you created.
- Under Access keys, click Create access key.
- Choose Application running outside AWS or another relevant use case.
- Click the Next button.
- Click the Create access key button.
- To view the Secret access key value, click Show.
- Copy the Access key (Access key ID) and Secret access
key values and save them somewhere safe. You can retrieve the secret access key only
when you create the key pair for the first time.
For detailed information, see Manage access keys for IAM users on the AWS documentation page.
- To obtain the Client ID and Client secret (BASIC OIDC and OIDC WEB), complete the following steps:
- Log in to the Microsoft Azure portal, and then click App registrations.
- In the
App registrations
page, click New registration. - In the
Register an application
page, specify a unique name for your app. - Select an option in the Supported account types section according to your
requirements.

- Click Register.
The Overview page for the application is displayed.

- Make a note of the Application (client) ID value because you need to specify it as a connection value when creating the account in App Connect.
- Next to Client credentials on the Overview page,
click Add a certificate or secret. This displays the
Certificates & secrets
page.
- Click + New client secret.
- In the
Add a client secret
panel, specify a description for the secret (for example, App Connect secret) and then select an expiry period. - Click Add.
The generated client secret is displayed on the
Certificates & secrets
page.
- Copy and store the client secret value because you need to specify it as a connection value when
creating the account in App Connect.Note: The client secret value won't be shown again in full after you leave this page.
- To find the Tenant ID, complete the following steps:
- Go to the Microsoft Azure portal login page, and then go to Microsoft Entra ID > Properties.
- Copy the Tenant ID value and save it somewhere safe.

For more information about obtaining the Tenant ID, see How to find your Microsoft Entra tenant ID on the Microsoft Entra Docs page.
- To obtain the Role ARN (BASIC OIDC and
OIDC WEB), complete the following steps:
- Log in to your AWS Management Console for IAM account.
- Click Identity providers on the sidebar.

- Click Add provider.
The Add Identity provider page appears.

- Select OpenID Connect as the Provider type.
- In the Provider URL field, enter
https://login.microsoftonline.com/<tenant ID>/v2.0Note: Replace<tenant ID>with your Microsoft Azure Tenant ID value. To obtain the Tenant ID, see step 4. - In the Audience field, enter the client ID value from Microsoft Azure.
- Click Add provider.
- On the new identity provider page, click the Assign role button.

- Select Create a new role, and then click Next.
The Select trusted entity page appears.

- Select Web identity as the Trusted entity type.
- In the Identity provider field, select the required provider URL from the drop-down menu.
- In the Audience field, select the specific client ID from the drop-down menu.
- Click the Next button.
The Add permissions page appears.

- Select the appropriate permissions policies to attach to your new role.
- Click the Next button.
The Name, review, and create page appears.

- In the Role name field, enter a name for the role.
- In the Description field, enter a description for the role.
- Click the Create role button.
- On the Roles page, select the role that you created.

- Copy the ARN value (this is your Role ARN value) and save it somewhere safe.
- To generate an ID token (BASIC OIDC), see Request an access token with a client_secret on the Microsoft Entra Docs page.
- To generate a Refresh token (BASIC OIDC), see Refresh the access token on the Microsoft Entra Docs page.