Set Up Unified AWS Access
Some Atlas features, including Data Federation and Encryption at Rest, authenticate with AWS IAM roles. When Atlas accesses AWS services, assumes an IAM role.
You can set up an assumed IAM role for your Atlas account to use
with the Atlas Administration API or Atlas UI if you have the
Project Owner role. Atlas supports unified access only
If you have Encryption at Rest enabled for your cluster and you want to set up a new IAM role, be sure the new role has access to the existing KMS.
To set up unified AWS access, you must have
Organization Owner or
Project Owner access to
An Atlas account.
Resume an Authorization Procedure
If you cancel a procedure to authorize an AWS IAM role for use with Atlas, you can resume it where you left off.
Expand the Options menu next to your project name in the Atlas UI upper left corner. Select Integrations.
Click the Configure button in the AWS IAM Role Access panel.
Note: if you already have one or more roles configured, the button reads Edit.
Any roles with an ongoing authorization procedure are listed with an
in progressstatus. Click the Resume button to resume the authorization process.
To cancel an in-progress role authorization completely, click the Delete icon next to the in-progress role.
Deauthorize an Assumed IAM Role
You can deauthorize an existing AWS IAM role from your Atlas account with the Atlas Administration API or the Atlas UI.
Be sure to remove any associated Atlas services from the IAM role before you deauthorize it.