Manual (Console-based)
Introduction
This guide walks you through the manual (console-based) onboarding flow for connecting an AWS account to the Xshield Cloud Connector. You perform the steps directly in the AWS Console and the Xshield portal—no script is run in your environment.
Use this method when:
-
You prefer to deploy the CloudFormation stack yourself in the AWS Console for full control and auditability
-
You want to skip the template and create the IAM role and permissions yourself, step by step, in the AWS Console
-
Your change-management or compliance process requires manual, documented steps
-
You need to align with existing AWS governance (e.g. stack naming, parameter review)
Who Does What
Manual (console-based) onboarding is done per AWS account by someone who has access to both AWS and Xshield:
| Who | What | Why |
|---|---|---|
| AWS account admin (or IAM principal with the required CloudFormation and IAM permissions) | Either deploy the CloudFormation stack from Xshield or create the cross-account IAM role and attach policies manually in the AWS Console (see Choose your path below) | The cross-account role and permissions allow Xshield to discover and monitor resources in your account; only someone with sufficient AWS permissions can create them. |
| Xshield user (with access to Cloud Connector) | Enter Account Name and Account ID in the Xshield portal, then Verify and Connect | Xshield uses this to associate the account with your tenant and complete the connection; verification confirms that ColorTokens can assume the cross-account role in your account (same for both paths). |
The same person can do both if they have access to AWS and Xshield; otherwise, the AWS admin completes the AWS steps and shares the Account ID, and a Xshield user completes the connection in the portal.
Prerequisites
Before you begin, ensure you have:
-
Active AWS account with the permissions required for the option you choose (see Choose your path below)
-
AWS Account ID for the account you want to onboard (find it in the AWS Console—account dropdown or Support center)
-
ColorTokens AWS account ID — you need the Xshield AWS Account ID for your region/site (see the table below)
-
Active Xshield account with access to the management portal
Production AWS account IDs:
| Region | Site | Xshield AWS Account ID |
|---|---|---|
| Asia Pacific (Mumbai) | bom.colortokens.com | 477784680886 |
| Europe (Frankfurt) | fra.colortokens.com | 010659611501 |
| US East (N. Virginia) | ng.colortokens.com | 918452924160 |
| Asia Pacific (Sydney) | syd.colortokens.com | 936344984566 |
If ColorTokens has provisioned a dedicated cloud environment for your organization, contact your account representative for the correct account IDs.
Step 1: Choose your path
You can complete the AWS setup in one of two ways:
-
Path A (CloudFormation template): Use the template from Xshield and create the stack in the AWS Console. The stack creates the cross-account IAM role and policies for you.
-
Path B (manual IAM): Skip the template and create the cross-account IAM role and attach policies yourself, step by step, in the AWS Console.
Both paths result in a cross-account IAM role that Xshield can assume to discover and monitor your AWS resources. After completing either path, continue with Step 3: Enter Account Details. For the full list of IAM permissions the cross-account role must have (e.g. for Terraform or other IaC), see Reference: IAM permissions for the cross-account role at the end of this guide.