Before deploying, you can view the template to understand what permissions you’re granting:
Copy
Ask AI
AWSTemplateFormatVersion: '2010-09-09'Description: | Rebase - Creates a secure IAM Role with AdministratorAccess that Rebase can assume to manage your AWS infrastructure. Rebase will assume this role using an External ID for added security.Parameters: StackIdentifier: Type: String Description: Identifier applied to stack resource names MinLength: 6 MaxLength: 24 ExternalID: Type: String Description: External ID provided by Rebase (required for secure access, leave unchanged). MinLength: 36 MaxLength: 36Resources: RebaseAccessRole: Type: AWS::IAM::Role Properties: RoleName: !Sub RebaseAccessRole-${StackIdentifier} Description: Cross account access for Rebase to manage your AWS infrastructure. AssumeRolePolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Principal: AWS: arn:aws:iam::776940548999:root # Rebase AWS Account ID Action: sts:AssumeRole Condition: StringEquals: sts:ExternalId: !Ref ExternalID ManagedPolicyArns: - arn:aws:iam::aws:policy/AdministratorAccessOutputs: RoleARN: Description: The ARN of the IAM role that can be assumed by Rebase. Value: !GetAtt RebaseAccessRole.Arn
This template creates a secure cross-account IAM role using AWS best practices with an External ID for enhanced security.