Skip to main content

Credentials

The Torque Credentials store is a built-in capability for Torque to securely store your Public Cloud authentication details in order for CloudFormation and Terraform type grains to securely access them. Credentials are similar in usage to Parameters, but unlike parameters which are single-value, credentials are specialized objects that contain multiple values with different structure depending on the credential type. Torque Credentials are supported for AWS (role based and access key based) and Azure (secret based) authentication.

To add a credential:

  1. Go to Administration > Credentials.
  2. Click Add Credentials.

    Locale Dropdown

  3. Give the credential a name and optionally a description.
  4. Select the cloud provider (AWS / Azure).
  5. Select the credential type and enter the authentication details.
    • For AWS, role assumption and access key credentials are supported. Make sure you have a Role Arn that allows Torque access. For details, see the Get Role ARN and external ID section below.

      Locale Dropdown

    • For Azure, only Service Principle Client ID and Secret are supported.

      Locale Dropdown

  6. Click Apply.
  7. Reference the credential in the grain's authentication section.

    Locale Dropdown

Get Role ARN and external ID

  1. In your AWS Management Console, open the IAM console at https://console.aws.amazon.com/iam/.

  2. In the navigation pane of the IAM console, create a permissions policy to be associated with the role.

    1. Select Policies, and then click Create Policy. For information and assistance on generating an AWS IAM Policy, you can use the official AWS Policy Generator.
    2. Assign the permissions as appropriate.
    3. Choose a name for your policy and save it.
  3. In the navigation pane of the IAM console, select Roles, and then click Create Role.

    1. From Select trusted entity, choose AWS Account.
    2. Under An AWS account ID, select An AWS account and enter 349148204654. (This is the Torque AWS account from which we will query the cost).
    3. Select Require external ID.
    4. Enter an External ID of your choosing. The External Id will be used to validate the Consumer of the ARN Role. Keep note of the external ID as you will need it later in the configuration step.
    5. In Next:Permissions, select the policy you have just created in step 1 for cost exploration permission.
    6. Click Next.
    7. Enter a Role Name or role name suffix to help you identify the purpose of this role or use AWS defined Name.
    8. Click Create Role.
    9. (Optional) Enter a Description for the new role.
    10. Review the role and then click Create role. Keep note of the role ARN as you will need it later in the configuration step.