Policies containing the API operations for creating and using connections
The following sample IAM policy describes the required permissions for creating, managing and using Salesforce connections within Amazon Glue ETL jobs. If you are creating a new role, create a policy that contains the following:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "secretsmanager:DescribeSecret", "secretsmanager:GetSecretValue", "secretsmanager:PutSecretValue", "glue:ListConnectionTypes", "glue:DescribeConnectionType", "glue:RefreshOAuth2Tokens", "glue:ListEntities", "glue:DescribeEntity" ], "Resource": "*" } ] }
You can also use the following IAM policies to allow access:
AWSGlueServiceRole
– Grants access to resources that various Amazon Glue processes require to run on your behalf. These resources include Amazon Glue, Amazon S3, IAM, CloudWatch Logs, and Amazon EC2. If you follow the naming convention for resources specified in this policy, Amazon Glue processes have the required permissions. This policy is typically attached to roles specified when defining crawlers, jobs, and development endpoints. AWSGlueConsoleFullAccess
– Grants full access to Amazon Glue resources when an identity that the policy is attached to uses the Amazon Management Console. If you follow the naming convention for resources specified in this policy, users have full console capabilities. This policy is typically attached to users of the Amazon Glue console.
If providing Network Options when creating a Salesforce connection, the following actions must also be included in the IAM role:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "ec2:CreateNetworkInterface", "ec2:DescribeNetworkInterface", "ec2:DeleteNetworkInterface", ], "Resource": "*" } ] }
For Zero-ETL Salesforce connections, see
Zero-ETL prerequisites
For Zero-ETL Salesforce connections, see
Zero-ETL prerequisites