If you haven’t configured your AWS management account in Opal, get started
with our AWS integration
guide before
configuring additional accounts.
1. Create Ingester Role
Note: This step can be skipped for your management account, as you configured its ingester role in the previous step. The ingester role allows Opal to read your configuration and populate it within Opal. Create a role called OpalIngester, with the same trust policy as above:2. Register Identity Provider
Add your OIDC identity provider to your AWS account—you can search for Identity provider in the AWS IAM console, then select Add provider. See the AWS documentation for more detail or alternative methods. Set the following fields in AWS.| Field | Value |
|---|---|
| Provider type | OpenID Connect |
| Provider URL | The issuer URL from your OIDC provider. This should be the same value as the Issuer URL in AWS Settings > OIDC Provider Settings in Opal. For example, https://companyname.oktapreview.com. |
| Audience | The Client ID from your OIDC provider. This should be the same value as the Client ID in AWS Settings > OIDC Provider Settings in Opal. |
3. Create User Role
The User role is used to grant your authenticated users access to the resources that have been allocated to them. Create a role called OpalUser with the following trust policy, substituting in your management account ID, OIDC issuer URL, and the Client ID used for your OIDC configuration:${ACCOUNT_ID}: The account ID of the account being configured${IDP_ISSUER_URL}: The OIDC issuer URL${OPAL_CLIENT_ID}: The Client ID you used in Step 3b

