Use AWS IAM roles
AWS-based customers can configure Seqera Platform to authenticate to AWS services like Batch with an IAM Role instead of IAM user credentials.
note
The provided policies were designed with certain assumptions:
- IAM Policy: Seqera must have full access to identified S3 buckets.
- Trust Policy: The Role should be assumable by EC2 or EKS (depending on your Seqera deployment), and only specifically-named IAM actors.
You may wish to limit S3 access to specific prefixes, and/or Role assumption to more specific platforms.
Configure the Seqera IAM policy
- Download the custom IAM Policy.
- Download the S3 bucket write policy.
- Modify the S3 bucket write policy by adding
"arn:aws:s3:::YOUR-BUCKET-NAME"
for each bucket that will be used as a pipeline work directory. - Revise the scope of access to a specific prefix in the S3 buckets, if needed (modify
"arn:aws:s3:::YOUR-BUCKET-NAME/*"
).
note
AWS credentials in Seqera are used to access S3 cloud buckets in Data Explorer. If the scope of access for the Seqera IAM policy excludes buckets or directories you need to access in Data Explorer, create additional Seqera credentials with S3 access specific to your Data Explorer needs.