LCA as AWS Lambda: Identity and Access Management

You can use AWS Lambda: Identity and Access Management to implement LCA.

Access to AWS Lambda Functions

To invoke the Lambda functions hosted in a customer AWS account, Reltio can use:

  • AWS credentials (Access Key, Secret Key) provided by the customer.
  • IAM roles for delegate access. This is the recommended approach.
Important: For security reasons, it is recommended that you use IAM roles (with temporary security credentials) instead of sharing the AWS standard long-term credentials. For configuration details, see AWS documentation.

Access with AWS Credentials

To use the regular credentials-based access to your LCA Handlers implemented as AWS Lambda Functions, file a ticket with Reltio Support. Include the following information in your request:

  • Environment name (Dev, Test, Prod, Preview)
  • Tenant name (Reltio Tenant ID)
  • AWS Access Key and AWS Secret Key of the AWS Account where the Lambda Functions are hosted.

Access with IAM Role

To use the IAM role-based access to your LCA Handlers implemented as AWS Lambda Functions, create the AssumeRole in your AWS account, with access to the particular AWS services (S3, Lambda).

Note: This role must have a Trusted Relationship with the Reltio AWS account. Contact the Reltio Customer Success representative with a request for Reltio AWS account information.