Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Info

Cloudaware uses OAuth standard to identify users who send requests to Cloudaware API. A current user should get a specific token to add or see accounts depending on their permissions.

Table of Contents

Get OAuth

...

token


1. Log in to your Cloudaware account → Admin.

...

Expand
titleIP Relaxation Tip

8.1. Log in to your Cloudaware account → Setup:

new setup.png

8.2. Type Apps in the Search bar → Connected Apps → Manage Connected Apps → click on the Cloudaware OAuth2 app:

adding aws accs - oauth - connected apps - select the app.png

Click Edit Policies:

adding aws accs - oauth - the app - edit policies.png

8.3. Select 'Relax IP restrictions' in 'IP Relaxation':

adding aws accs - oauth - the app - relax ip restrictions.png

Click Save.

Get API

...

key


The API key is required for performing requests to Cloudaware API.


1. Create a Google Cloud Project account.


2. Submit an access request to support@cloudaware.com providing the full e-mail of the associated Google Cloud Project account.


3. Activate access to Cloudaware API using API Manager. Go to https://console.cloud.google.com → open a navigation menu (hamburger button) → select 'APIs & Services' in the menu on the left.

...

Select 'Library' → filter by Private.

...


4. Select external.endpoints.cloudaware-vm.cloud.goog Enable.

...

5. Go back to 'APIs & Services' → Credentials → Create credentials → API Key.

...


6. Copy the API Key to the clipboard:

...

Add

...

AWS accounts using API


The Google APIs Explorer is a tool allowing to explore and test APIs.

...


2. Click on a gear button. Select ‘Set 'Set API key / OAuth 2.0 Client ID’. ID':

...

Insert API key and OAuth 2.0 . Client IDtoken. Click Save.

...

3. Go to Services → External API v1 → select external.amazon.account.create

...

4. Insert Fill out the form:

...

WHERE
token - insert the OAuth token generated before (see p.3) and fill out the request body as below:Image Removed. Select fields in ‘Request body’ to make it look like below:

sandbox - select true if your Salesforce org is a sandbox, otherwise select false

Request body - select properties successively as role, trustedAccount, accountId, externalId, usages, name

Code Block
{
  "role": 
  {
    "trustedAccount": 
    {
      "accountId": ""
    },
    "externalId": ""
  },
  "usages": 
  [
  ],
  "name": ""
}

5. Click Authorize And and Execute.