You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add wildcard support and email mapping for AWS cloud authentication (#33393)
- Add documentation for wildcard support in ARN patterns
- Update service account mapping to support both UUID and email address
- Add link to AWS IAM role creation documentation
Copy file name to clipboardExpand all lines: content/en/account_management/cloud_provider_authentication.md
+61-4Lines changed: 61 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,6 +57,8 @@ Setting up cloud-provider based authentication for AWS involves two parts:
57
57
58
58
First, map your AWS identities (ARNs) to Datadog service accounts or user accounts. During the preview, you must perform the mapping using the Datadog API.
59
59
60
+
If you need to create IAM roles in AWS, see the [AWS IAM role creation documentation][5].
61
+
60
62
#### Map an AWS ARN to a Datadog user account
61
63
For `account_identifier`, use the email shown in the user's Datadog profile.
To get a service account's `account_identifier`, go to **Organization settings > Service accounts**, click the service account you want to map, and copy the `service_account_id` from the URL. For example, if the URL ends in `/organization-settings/service-accounts?service_account_id=3fa85f64-5717-4562-b3fc-2c963f66afa6`, then use `3fa85f64-5717-4562-b3fc-2c963f66afa6` as an account identifier for your service account.
85
+
For `account_identifier`, you can use either:
86
+
- The service account's **UUID**: Go to **Organization settings > Service accounts**, click the service account you want to map, and copy the `service_account_id` from the URL. For example, if the URL ends in `/organization-settings/service-accounts?service_account_id=3fa85f64-5717-4562-b3fc-2c963f66afa6`, then use `3fa85f64-5717-4562-b3fc-2c963f66afa6`.
87
+
- The service account's **email address**: Use the email address shown in the service account's details.
84
88
85
-
**Example**: An API call that maps an AWS ARN to a Datadog service account, `3fa85f64-5717-4562-b3fc-2c963f66afa6`.
89
+
**Example**: An API call that maps an AWS ARN to a Datadog service account using the UUID, `3fa85f64-5717-4562-b3fc-2c963f66afa6`.
86
90
87
91
```bash
88
-
# Example: map an AWS ARN to a Datadog Service Account
92
+
# Example: map an AWS ARN to a Datadog Service Account using UUID
89
93
curl -X POST "{{< region-param key=dd_api code="true" >}}/api/v2/cloud_auth/aws/persona_mapping" \
ARN patterns support wildcard matching to handle dynamic or variable portions of resource ARNs. This is useful when working with assumed roles that include session identifiers or other variable components.
130
+
131
+
**Wildcard rules**:
132
+
- Wildcards (`*`) are only allowed in the last portion of the resource ARN
133
+
- You must specify a specific resource before the wildcard
134
+
- Wildcards cannot be placed in the middle of the ARN
135
+
136
+
**Example**: Match any session assuming the `DatadogTerraformerRole`:
137
+
138
+
```bash
139
+
curl -X POST "{{< region-param key=dd_api code="true" >}}/api/v2/cloud_auth/aws/persona_mapping" \
<divclass="alert alert-info">Wildcard matching is particularly useful for CI/CD pipelines where role sessions have dynamically generated identifiers.</div>
159
+
104
160
#### List existing mappings
105
161
106
162
```bash
@@ -157,4 +213,5 @@ The Terraform provider automatically uses your configured AWS credentials to aut
0 commit comments