Add Credentials

Step 1: Access the Cloud Connection Section

  • Navigate to the 'Settings > Cloud Connections'

  • Navigate to the 'Create Cluster > Cloud Credentials > + Add New' management area within the Scoutflo platform.

Step 2: Initiate Adding New Cloud Connection

  • You will be able to see an existing list of Cloud Connections, add earlier by you.

  • Click on the Add New Cloud Connection button.

Step 4: Enter Credential Information

  • You'll need to provide the following Connection Details:

  1. Credential Name

    • Must be unique across your account

    • Examples:

      • prod-aws-useast1

      • dev-aws-euwest2

    • Cannot reuse previously used names

  2. AWS Account Number

    • Your 12-digit AWS account identifier

    • Found in your AWS account settings

  • After clicking "Create", you'll be redirected to the AWS CloudFormation Console:

  1. Template Information

    • Pre-configured CloudFormation template

    • Stack description explaining the purpose

    • Automatically generated stack name

  2. Parameters

    • ScoutfloIdentifier: Your unique platform identifier

    • ScoutfloUserId: Your platform user ID

    • Already filled in - no action needed

  3. Permissions Section

    • IAM role creation acknowledgment

    • Required for secure access setup

Creating the Stack

Important actions on the AWS Console:

  1. Review Details

    • Verify template information

    • Check parameter values

  2. Acknowledge IAM Creation

    • Find the checkbox:

      I acknowledge that AWS CloudFormation might create IAM resources with custom names
    • Must be checked '👍' to proceed

  3. Initiate Creation

    • Click "Create Stack" button

    • Process typically takes 1-2 minutes

Verification Process

Our platform will:

  1. Monitor stack creation progress

  2. Display a 120-second countdown

  3. Verify the connection

  4. Show success confirmation

Security Deep Dive

Temporary Credentials:

Our implementation uses AWS Security Token Service (STS) to:

  • Generate time-limited credentials

  • Automatically expire access after 30 minutes

  • Create new credentials only when needed

  • Maintain principle of least privilege

Permission Management

The created IAM role:

  • Has specific, limited permissions

  • Only allows required AWS services

  • Includes automatic cleanup process

  • Maintains detailed access logs

Final Confirmation:

  1. Stack creates successfully

  2. Connection shows as "Enabled"

  3. Resources can be created immediately

  4. Automatic credential management begins

  • Once you have successfully added the credentials, you will be able to select the newly added credentials through the drop down on the Create Cluster screen.

Stack Creation Fails

  • Check AWS permissions

  • Verify account number

  • Review error message in AWS Console

  • Try again with same or new name

Connection Times Out

  • Wait for full 120 seconds

  • Check internet connectivity

  • Verify AWS Console access

  • Restart process if needed

Name Already Exists

  • Choose new credential name

  • Follow naming conventions

  • Delete old unused credentials

Last updated