Prerequisites
Before connecting your AWS account, make sure you have:- An active AWS account with admin permissions
- Access to the AWS Management Console
- A Rebase account (sign up at app.rebase.run)
Connection Process
Step 1: Launch CloudFormation Stack
From your Rebase dashboard, click Create New Workspace. This will provide you with a CloudFormation template link.- Open the CloudFormation link in a new tab
- You’ll be redirected to the AWS Console
- The template will be pre-loaded with the necessary IAM roles and permissions

Step 2: Review the CloudFormation Template
Before deploying, you can view the template to understand what permissions you’re granting:Step 3: Deploy the Stack
In the AWS CloudFormation console:- Enter a stack name (make it descriptive like “Rebase-Production”)
- Review the stack details (parameters are pre-filled)
- Scroll down and check the Capabilities acknowledgment box for IAM resource creation
- Click Create Stack

- IAM roles for secure access
- Cross-account trust relationships
- Minimum required permissions for Rebase



Step 3: Get the Role ARN
Once the stack deployment is complete:- Go to the Outputs tab in CloudFormation
- Copy the Role ARN value
- It will look like:
arn:aws:iam::123456789012:role/RebaseRole

Step 4: Complete Workspace Setup
Return to your Rebase window and fill in the workspace details:- Workspace Name - Give your workspace a descriptive name
- Admin Email - Your notification email address
- Timezone - Select your primary timezone
- External ID - Auto-generated unique identifier
- Role ARN - Paste the ARN from Step 3
- Default Region - Choose your primary AWS region

What Rebase Can Access
Rebase uses least-privilege access principles. The IAM role grants permissions for:- Read access to view your AWS resources
- Infrastructure management for VPCs, EC2, S3, and other core services
- Cost optimization to help reduce your AWS spend
- Security analysis to identify potential issues
- Your application data or databases
- Billing information or payment methods
- Resources outside the connected AWS account

Troubleshooting
CloudFormation Deployment Failed
If the stack deployment fails:- Check that you have admin permissions in your AWS account
- Ensure you’re in the correct AWS region
- Try deploying in a different region if you encounter quota limits
Role ARN Not Working
If Rebase can’t assume the role:- Verify you copied the complete ARN from CloudFormation outputs
- Check that the CloudFormation stack deployed successfully
- Wait a few minutes for AWS IAM propagation
Connection Timeout
If the workspace creation times out:- Refresh the page and try again
- Check your internet connection
- Contact support if the issue persists
Multiple AWS Accounts
You can connect multiple AWS accounts to Rebase by creating separate workspaces:- Each workspace connects to one AWS account
- Switch between workspaces using the workspace selector
- Maintain separate configurations and permissions per account
Security Best Practices
- Regular audits - Review connected accounts periodically
- Least privilege - Rebase only requests minimum required permissions
- Monitoring - Use AWS CloudTrail to monitor Rebase API calls
- Rotation - Regenerate external IDs if needed for enhanced security
Next Steps
Once connected, you can:- Explore built-in prompts for common AWS tasks
- Ask questions about your infrastructure in natural language
- Set up cost monitoring and optimization
- Deploy new resources through conversations
Need Help?
If you run into any issues during the connection process:- Contact support at support@rebase.run