This section guides you through management of AWS IAM roles needed for operating Viz Now with your AWS account.
Secure, reliable operations are ensured by first clarifying permissions and adopting these best practices.
Overview
Viz Now requires two IAM roles:
IAM Role Name | Purpose | Used By |
|---|---|---|
| Provisions infrastructure via Terraform | Deployment Agent |
| Manages deployed instances | Control Plane |
These roles are assumed using AWS STS (Security Token Service), and their ARNs are stored securely in Viz Now.
Prerequisites
An active AWS account.
IAM Administrator access to AWS.
Administrator access to the Viz Now platform.
Update Existing IAM Roles
If your AWS account already has Viz Now IAM roles defined, follow these guidelines to update them.
Note: If your AWS account has no Viz Now IAM roles defined, first see section Creating First IAM Role.
IAM Roles
You will update both the Deploy and Management IAM roles and their associated inline policies.
To update an IAM role in Viz Now
This procedure assumes that your Viz Now user details are already setup in AWS. See the Note above.
Log in to your AWS Management Console with IAM Administrator permissions.
Keep this tab active in your browser.Log in to the Viz Now and navigate to the panel Organization > Infrastructure tab > Manage IAM Roles.
You’ll see a screen like the one below, where you can define the IAM Role ARNs for the Deploy and Control Plane functionality.Keep this tab active in your browser.
Deploy roleUpdate the inline policy:
Switch to the AWS console IAM > Roles and from the Permissions tab, you can search for required inline policy.
This is the same as in the Viz Now UI:Click it to open.
Go back to Viz Now and in the Manage IAM Roles panel, next to Deploy Role, click the Question mark icon .
and then Copy inline policy.
(This saves the policy details to the clipboard).
Switch back to the AWS Console Policy editor and click the JSON button.
In the Policy editor, paste-in the inline policy from the clipboard.
Click Next and then click Save changes.
A confirmation message is displayed.
Management Role
You now repeat the same steps for the Management role.
In Viz Now, next to the input field Management Role, click the Question mark icon .
From the pop-up, click Copy inline policy.
In the AWS Console, search for the required manage role, in this example, viz-now-manage, and click on it to display a Summary page.
Select the Permissions tab and then its contained policy.
The Policy editor page opens:Paste-in the inline policy that you copied to your clipboard, to update the JSON code.
For an example, see the code below.Click Save changes.
Validate IAM Role in Viz Now:
Click Cancel.
In Viz Now Manage IAM Roles panel, click Validate Roles.
A confirmation message is displayed.
Permissions Explained
Deploy Role (viz-now-deploy-infra)
The Deploy role grants broad permissions to allow Spacelift to deploy infrastructure using Terraform. All permissions apply to all resources ("Resource": "*").
Permission | Purpose | Resource Scope |
|---|---|---|
| Manages IAM roles/users | Scope to specific roles |
| Manages S3 buckets | Scope to specific buckets |
| Manages encryption keys | Scope to specific keys |
| Configures DNS | Scope to specific zones |
| Assumes roles | Necessary for Spacelift |
| Provisions EC2 resources | Scope to specific VPCs |
| Applies tags | All ( |
| Manages CloudWatch logs | Scope to specific log groups |
Manage Role (viz-now-manage)
The Manage role enables Viz Now to perform operational tasks on deployed instances. Permissions are scoped to specific resources whenever possible.
Key Tasks Enabled by Manage Role
Increase service quotas for AWS resources.
Reserve specific EC2 instance types.
Create S3 buckets for file storage.
Manage security groups for IP-based access.
Handle VPC peering.
Start, stop, or destroy instances.
Manage MediaConnect flows for streaming.
Permission | Purpose | Resource Scope |
|---|---|---|
| Manages IAM configurations | All ( |
| Manages encryption keys | All ( |
| Updates DNS | All ( |
| Increases quotas | All ( |
| Manages S3 buckets | All ( |
| Manages instances | All ( |
| Manages tags | All ( |
| Assumes roles | All ( |
| Manages CloudWatch logs | All ( |
| Executes commands | SSM documents & tagged EC2 instances ( |
| Checks command status | All ( |
| Retrieves instance details | Tagged resources ( |
| Creates MediaConnect flows | All ( |
| Manages MediaConnect flows | Flows named |
| Lists flows | All ( |














