Skip to main content

On Demand Cloud Connect - AWS prerequisites

This section discusses the AWS prerequisites for using Evolution Platform Cloud connect.

Here are the prerequisites:

  • Creating a Dedicated IAM User
  • Defining User Permissions

Prerequisite 1 : Creating a Dedicated IAM User

AWS IAM (Identity and Access Management) allows you to create technical accounts dedicated to services like Evolution Platform, providing them with controlled access to AWS APIs and the AWS Console.

These accounts are not intended for developers or employees, but rather for automated integrations such as the Evolution Platform.

We strongly recommend creating a dedicated IAM user for Evolution Platform (e.g., evolve-access) to ensure a clear separation between:

  • IAM accounts for employees within your organization
  • IAM accounts used by third-party services (so-called "robot" users), like Evolution Platform

This separation helps improve permission management, access tracking, and overall security.

Create an IAM user – AWS Identity and Access Management (IAM) – AWS Docs
Create or manage IAM access keys – AWS Docs

Prerequisite 2 : Defining User Permissions

Once the IAM user dedicated to the Evolution Platform is created (often named "cloudco"), you must assign IAM policies that define what the user is allowed to do in your AWS account.

Recommendations

  • Grant only the minimum permissions required, avoiding wildcards (*) whenever possible
  • Document all policies attached to this user
  • Prefer AWS-managed policies or well-scoped custom policies

IAM Policies – AWS Docs

Minimum required permissions

Below are the minimum IAM permissions a customer must assign to Orange Business :

  • Accept Hosted Connections
  • Create and manage Virtual Interfaces (VIF)
  • Associate VIF with VPC/VGW/DXGW VPC, VGW or *Direct Connect Gateway
  • Read network configuration
FonctionPermissions requises
Accept Hosted Connectiondirectconnect:ConfirmConnection
Create Private/Public VIFdirectconnect:Create*VirtualInterface
Associate VIF with VPC/VGW/DXGWdirectconnect:AssociateVirtualInterface
Read network configurationec2:Describe*

For CloudCo Aws Public

EC2 – Network Gateways discovery & management :


Need IAM PermissionDescription
List AWS regionsec2:DescribeRegions
Check access to a regionec2:DescribeAvailabilityZones
List VPCsec2:DescribeVpcs
List Transit Gateways (TGW)ec2:DescribeTransitGateways
List VPN Gateways (VGW)ec2:DescribeVpnGateways
Create a Customer Gatewayec2:CreateCustomerGateway
Delete a Customer Gatewayec2:DeleteCustomerGateway
List VPN Connectionsec2:DescribeVpnConnections
Create a VPN Connectionec2:CreateVpnConnection
Delete a VPN Connectionec2:DeleteVpnConnection

For CloudCo Aws Private

Required IAM Permissions – AWS Direct Connect :


RequirementDescriptionAWS API Action
List Direct Connect connectionsList all Direct Connect connectionsdirectconnect:DescribeConnections
Confirm a Hosted ConnectionConfirm a hosted connectiondirectconnect:ConfirmConnection
List Virtual Interfaces (VIFs)List all Virtual Interfaces (VIFs)directconnect:DescribeVirtualInterfaces
List Direct Connect locationsList all Direct Connect locationsdirectconnect:DescribeLocations
List Direct Connect interconnectsList all Direct Connect interconnectsdirectconnect:DescribeInterconnects
Read Direct Connect tagsRead tags associated with Direct Connectdirectconnect:DescribeTags
Create a Private Virtual InterfaceCreate a private Virtual Interfacedirectconnect:CreatePrivateVirtualInterface
Create a Transit Virtual InterfaceCreate a transit Virtual Interfacedirectconnect:CreateTransitVirtualInterface
Delete a Private Virtual InterfaceDelete a private Virtual Interfacedirectconnect:CreatePrivateVirtualInterface
Delete a Transit Virtual InterfaceDelete a transit Virtual Interfacedirectconnect:CreateTransitVirtualInterface
List Direct Connect GatewaysList all Direct Connect Gatewaysdirectconnect:DescribeDirectConnectGateways

AWS Direct Connect - IAM Permissions Documentation

Direct Connect Permissions


IAM ActionFunctional Description
directconnect:DescribeConnectionsView available Direct Connect connections
directconnect:ConfirmConnectionAccept / confirm a connection
directconnect:DescribeVirtualInterfacesList virtual interfaces (VIF)
directconnect:DescribeLocationsView available locations
directconnect:DescribeInterconnectsView interconnects
directconnect:DescribeTagsRead resource tags
directconnect:CreatePrivateVirtualInterfaceCreate Private VIF (VPC)
directconnect:CreateTransitVirtualInterfaceCreate Transit VIF (TGW)
directconnect:DescribeDirectConnectGatewaysView Direct Connect Gateways
directconnect:DescribeDirectConnectGatewayAssociationsView Gateway ↔ VIF associations
directconnect:TagResourceAdd or modify tags
directconnect:DeleteVirtualInterfaceDelete a VIF

EC2 Network Permissions


IAM ActionFunctional Description
ec2:DescribeVpnGatewaysView Virtual Private Gateways
ec2:DescribeRegionsList AWS regions

Example JSON for IAM Permission Implementation

{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AllowDirectConnectAndNetworkManagement",
"Effect": "Allow",
"Action": [
"directconnect:DescribeConnections",
"directconnect:ConfirmConnection",
"directconnect:DescribeVirtualInterfaces",
"directconnect:DescribeLocations",
"directconnect:DescribeInterconnects",
"directconnect:DescribeTags",
"directconnect:CreatePrivateVirtualInterface",
"directconnect:CreateTransitVirtualInterface",
"directconnect:DescribeDirectConnectGateways",
"ec2:DescribeVpnGateways",
"ec2:DescribeRegions"
],
"Resource": "*"
},
{
"Sid": "AllowAccountListRegions",
"Effect": "Allow",
"Action": "account:ListRegions",
"Resource": "arn:aws:account::<ACCOUNT_ID_CLIENT>:account"
},
{
"Sid": "AllowVIFManagementMultiRegion",
"Effect": "Allow",
"Action": [
"directconnect:TagResource",
"directconnect:DeleteVirtualInterface"
],
"Resource": "arn:aws:directconnect:*:<ACCOUNT_ID_CLIENT>:dxvif/*"
},
{
"Sid": "AllowAllDXGatewayAssociations",
"Effect": "Allow",
"Action": "directconnect:DescribeDirectConnectGatewayAssociations",
"Resource": "*"
}
]
}