Skip to content

Authorizing Cloud Manager in the Remote Cloud Provider ​

Learn about the entitlements for the Cloud Manager module in the remote cloud provider required to use the VPC peering feature.

To create VPC peering in SAP BTP, Kyma runtime, you must authorize the Cloud Manager module in the remote cloud provider to accept the connection.

Amazon Web Services ​

For cross-account access in Amazon Web Services, Cloud Manager uses AssumeRole. AssumeRole requires specifying the trusted principle. For more information, see the official Amazon Web Services documentation.

Use the following table to identify the Cloud Manager principal. Then, perform the required actions.

BTP Cockpit URLKyma Dashboard URLCloud Manager Principal
https://canary.cockpit.btp.int.saphttps://dashboard.stage.kyma.cloud.saparn:aws:iam::194230256199:user/cloud-manager-peering-stage
https://emea.cockpit.btp.cloud.saphttps://dashboard.kyma.cloud.saparn:aws:iam::194230256199:user/cloud-manager-peering-prod
  1. Create a new role named CloudManagerPeeringRole with a trust policy that allows the Cloud Manager principal to assume the role:

    json
    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Effect": "Allow",
                "Principal": {
                    "AWS": "{CLOUD_MANAGER_PRINCIPAL}"
                },
                "Action": "sts:AssumeRole"
            }
        ]
    }
  2. Create a new CloudManagerPeeringAccess managed policy with the following permissions:

    json
    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Sid": "Statement1",
                "Effect": "Allow",
                "Action": [
                    "ec2:AcceptVpcPeeringConnection",
                    "ec2:DescribeVpcs",
                    "ec2:DescribeVpcPeeringConnections",
                    "ec2:DescribeRouteTables",
                    "ec2:CreateRoute",
                    "ec2:CreateTags"
                ],
                "Resource": "*"
            }
        ]
    }
  3. Attach the CloudManagerPeeringAccess policy to the CloudManagerPeeringRole.

Google Cloud ​

Grant the following permissions to the Kyma service account in your GCP project:

PermissionDescription
compute.networks.addPeeringRequired to create the peering request in the remote project and VPC.
compute.networks.getRequired to fetch the list of existing VPC peerings from the remote VPC.
compute.networks.listEffectiveTagsRequired to check if the remote VPC is tagged with the Kyma shoot name tag.

It is recommended to create an Identity and Access Management (IAM) custom role with the permissions listed above. For more information, see the official Google Cloud documentation on how to create a custom role or the Authorize Cloud Manager in the Remote Project section in the Creating VPC Peering in Google Cloud tutorial.

Service Account ​

Use the following table to identify the correct Cloud Manager service account:

BTP Cockpit URLKyma Dashboard URLCloud Manager Service Account
https://canary.cockpit.btp.int.saphttps://dashboard.stage.kyma.cloud.sapcloud-manager-peering@sap-ti-dx-kyma-mps-stage.iam.gserviceaccount.com
https://emea.cockpit.btp.cloud.saphttps://dashboard.kyma.cloud.sapcloud-manager-peering@sap-ti-dx-kyma-mps-prod.iam.gserviceaccount.com

With the service account, you can authorize the Cloud Manager module in the remote project. For more information, see the official Google Cloud documentation on how to grant a single role to a service account or the Authorize Cloud Manager in the Remote Project section in the Creating VPC Peering in Google Cloud tutorial.

Microsoft Azure ​

To authorize Cloud Manager in the remote subscription, Microsoft Azure requires specifying the service principal. Use the following table to identify the Cloud Manager service principal. Then, perform the required actions.

BTP Cockpit URLKyma Dashboard URLCloud Manager Service PrincipalCloud Manager Application (Client) ID
https://canary.cockpit.btp.int.saphttps://dashboard.stage.kyma.cloud.sapkyma-cloud-manager-peering-stage8e08320c-7e81-42bd-9eee-e5dae04cadf0
https://emea.cockpit.btp.cloud.saphttps://dashboard.kyma.cloud.sapkyma-cloud-manager-peering-prod202aa655-369d-4fe7-bbbc-d033d96a687e
  1. Verify if the Cloud Manager service principal exists in your tenant.
  2. Optional: If the service principal doesn't exist, create one for the Cloud Manager application in your tenant.
  3. Assign the Classic Network Contributor and Network Contributor roles to the Cloud Manager service principal.

For more information, see the official Microsoft Azure documentation on how to Assign Azure roles using the Azure portal and how to Manage service principals or the Authorize Cloud Manager in the Remote Subscription section in the Creating VPC Peering in Microsoft Azure tutorial.