© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
{
"Sid": "IoTWirelessGatewayCertManager",
"Effect": "Allow",
"Action": [
"iot:CreateKeysAndCertificate",
"iot:DescribeCertificate",
"iot:ListCertificates",
"iot:RegisterCertificate"
],
"Resource": "*"
}
]
}
c.
After updating the policy, select
Review Policy
to open the
Review Policy
page and make the
following changes:
•
In the
Name
field, enter
AWSIoTWirelessGatewayCertManager
.
NOTE:
You
MUST
enter the policy name as
AWSIoTWirelessGatewayCertManager
and
cannot use a different name. This is for consistency with future releases.
•
In the
Description
field, enter a description of your choice.
d.
After reviewing the policy and specifying the name and description, select
Create Policy
to create
the policy. A confirmation message indicating that the policy has been created is displayed.
5.
Once the correct policy is specified, select
Next: Tags
and then
Next: Review
to review and create the
IAM role.
6.
In the role review page, enter
IoTWirelessGatewayCertManagerRole
in the
Role Name
field and select
Create Role
to the create the IAM role.
NOTE:
You
MUST
enter the role name as
IoTWirelessGatewayCertManagerRole
and cannot use a
different name. This is for consistency with future releases.
7.
Once the role is created, you will need to specify the trust relationships and policies for the role. In the
confirmation message indicating that the role has been created, select
IoTWirelessGatewayCertManagerRole
to edit the newly created role.
8.
In the resulting role
Summary
page, select the
Trust Relationships
tab and then select
Edit Trust
Relationship
.
9.
Navigate to the
Policy Document
for the role’s trust relationship and change the
Principal
property to
represent the IoT wireless service. The
Principal
value should look like the following:
"Principal": {
"Service": "iotwireless.amazonaws.com"
}
10.
After changing the
Principal
property, the complete policy document should look like the following:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "iotwireless.amazonaws.com"
},
"Action": "sts:AssumeRole",
"Condition": {}
}
]
}
11.
If the policy is specified correctly, select
Update Trust Policy
to save your changes and exit the role
configuration.
Once these steps are completed, you have successfully configured the IAM CUPS role
(
IoTWirelessGatewayCertManagerRole
) and can proceed to configuring the AWS IoT Core destination role.