An IAM role is an identity and access management entity that defines a set of permissions for making AWS service requests. IAM roles are not associated with a specific user or group. Instead trusted entities assume roles, such as IAM users, applications or AWS services such as EC2.
Open a second browser tab to perform the following tasks.
To create your IAM role, log in to the console using your newly created account.
Upon login, you will be taken to the AWS console, where many different options are presented. Note the Recently Visited Services section. As a new user, no recently visited services will be available, but upon future visits, recently accessed services will allow you to return to commonly used services quickly. If a new user, expand All Services, and scroll down to Security, Identity and Compliance, and select IAM.
This will open the IAM Management Console. Select Roles from the left hand panel.
Here you will find an explanation of IAM roles and their function. Click Create Role to create a new role.
Select EC2. This will allow EC2 instances to call EC2 services on your behalf. Click Next: Permissions.
Next, click Create Policy.
Buurst provides a preconfigured IAM role, built for SoftNAS instances. For your convenience, the IAM role is posted below.
Note: Please verify that the below IAM Role matches the provided IAM role on the Configuring AWS Identity and Access Management page.
Return to the browser tab where you were creating your policy, and select the JSON tab within. Delete the default content.
Paste the content copied from documentation into the JSON tab, and select Review Policy.
Here you will provide a name for the IAM policy. The name provided must be SOFTNAS_DISK_IAM or SOFTNAS_HA_IAM. You can also provide a description of the policy, but this is optional.
Once your policy is named, click Create Policy.
The IAM Role and Policy you created will now be available for selection when creating your instance (in step 2 of instance creation, Instance Details).