Skip to content

Commit e4332f7

Browse files
authored
Update README.md
1 parent a363049 commit e4332f7

File tree

1 file changed

+20
-0
lines changed

1 file changed

+20
-0
lines changed

README.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,26 @@ To call this module, you will need three `aws` providers set up against differen
2020
- meshcloud account: meshStack will use this account to host the IAM users used by meshStack
2121
- automation account: meshStack will use this account to manage CloudFormation that are used in [Landing Zones](https://docs.meshcloud.io/docs/meshcloud.landing-zones.html).
2222

23+
Here is how the users and roles for the meshplatform fit together:
24+
25+
```mermaid
26+
graph LR;
27+
subgraph Organization Account
28+
meshfedServiceRole("🪖 MeshfedServiceRole");
29+
costExplorerServiceRole("🪖 MeshCostExplorerServiceRole");
30+
end
31+
subgraph meshcloud Account
32+
replicatorUser["👤 ReplicatorUser & AccessKey"];
33+
costExplorerUser["👤 CostExplorerUser & AccessKey"];
34+
end
35+
replicatorUser--Trusted Entity with External-id-->meshfedServiceRole;
36+
costExplorerUser--Trusted Entity with External-id-->costExplorerServiceRole;
37+
subgraph Automation Account
38+
meshfedAutomationRole("🪖 MeshfedAutomationRole");
39+
end
40+
replicatorUser--Trusted Entity with External-id-->meshfedAutomationRole
41+
```
42+
2343
If you're planning to execute the setup manually, one simple way to set up the required providers is by setting up three
2444
different profiles on your AWS CLI and include those IAM users' access and secret keys in your `~/.aws/credentials` file
2545
as described below.

0 commit comments

Comments
 (0)