Navigate to the create role section of the AWS IAM console
Select AWS account for the Trusted entity type
Select Another AWS account under An AWS account
Enter 284838358097 for the Account ID. This is envsecrets’s account ID.
Under Options check Require external ID
Enter your organisation ID for the External ID. You can obtain your organisation ID by visiting the organisation settings in your envsecrets dashboard.
Leave require MFA unchecked
Attach the “envsecrets” policy you created above.
Name your role as “envsecrets” and complete the role setup.
Copy the new role’s ARN.
Configuration
Go to integrations catalog in your envsecrets dashboard and choose “AWS Secrets Manager.”
On the setup/connection page, enter your AWS region and ARN of the “envsecrets” role you created above and save.
Go to the integrations dashboard in your envsecrets organisation and under “AWS Secrets Manager” choose “Sync New Environment With Your AWS Secrets Manager Account.”
In the page that opens, select your envsecrets project, environment and enter the name with which you wish you save your secret in AWS Secrets Manager.