Step 3. Specify IAM Identity

In this article

    At the Account step of the wizard, choose whether you want to use an IAM role or one-time access keys of an IAM user to allow Veeam Backup for AWS to perform the restore operation. For information on what permissions the IAM role or IAM user must have to perform restore, see EFS Restore IAM Permissions.

    Important

    Make sure, that the specified IAM role or one-time access keys belong to an AWS account where the source file system resides.

    Specifying IAM Role

    To specify an IAM role for restore:

    1. Select the IAM role option.
    2. Select the necessary IAM role from the drop-down list.

    For an IAM role to be displayed in the IAM role list, it must be added to Veeam Backup for AWS as described in Adding IAM Roles. If you have not added the necessary IAM role to Veeam Backup for AWS beforehand, you can do it without closing the EFS Restore wizard. To add an IAM role, click Add and complete the Add IAM Role wizard.

    It is recommended that you check whether the selected IAM role has all the required permissions to perform the operation. If the IAM role permissions are insufficient, the backup policy will fail to complete successfully. To run the IAM role permission check, click Check Permissions. Veeam Backup for AWS will display the Permission check window where you can track the progress and view the results of the check. If the IAM role permissions are insufficient, the check will complete with errors, and the list of permissions that must be granted to the IAM role will be displayed in the Missing Permissions column. You can grant the missing permissions to the IAM role using the AWS Management Console or instruct Veeam Backup for AWS to do it.

    Tip

    To download the full list of missing permissions as a single JSON policy document that you can use to grant the permissions to the role in the AWS Management Console, click Export Missing Permissions.

    To let Veeam Backup for AWS grant the missing permissions:

    1. In the Permission check window, click Grant.
    2. In the Grant permissions window, provide one-time access keys of an IAM user that is authorized to update permissions of IAM roles, and then click Apply.

    The IAM user must have the following permissions:

    "iam:CreatePolicy",

    "iam:GetRole",

    "iam:GetPolicy",

    "iam:AttachRolePolicy"

    Note

    Veeam Backup for AWS does not store one-time access keys in the configuration database.

    1. To make sure that the missing permissions have been successfully granted, click Recheck.

    Step 3. Specify IAM Identity 

    Specifying One-Time Access Keys

    To specify one-time access keys for restore:

    1. Select the Temporary access keys option.
    2. Use the Access key and Secret key fields to provide the access key ID and the secret access key.

    Note

    Veeam Backup for AWS does not store one-time access keys in the configuration database.

    Step 3. Specify IAM Identity