5 min read
Guide

Connecting AWS

Learn how to securely connect your AWS account to Sesquatch using IAM roles. This cross-account access method ensures your credentials are never stored.

Security First

Sesquatch uses IAM role assumption to access your AWS resources. This means we never store your AWS credentials. You maintain full control and can revoke access at any time by deleting the IAM role.

Prerequisites

  • An AWS account with SES enabled in your desired region
  • Permissions to create CloudFormation stacks (or IAM roles/policies for manual setup)

SES Sandbox Mode

New AWS accounts have SES in sandbox mode, which restricts who you can send emails to. You can still connect to Sesquatch and manage templates, but to send test emails to unverified addresses, you'll need to request production access from AWS. See the Testing Emails guide for more details.

Connection Methods

There are two ways to connect your AWS account. Both create the same IAM role with identical permissions.

Launch Stack (Recommended)

One-click deployment using AWS CloudFormation. Opens the AWS Console with everything pre-configured.

  • Fastest setup
  • No manual configuration
  • External ID pre-filled

Manual Setup

Copy the CloudFormation template and deploy it yourself. Useful for restricted environments or custom workflows.

  • Full control over deployment
  • Review template before deploying
  • Works with restricted IAM

Step 1: Start the Connection Wizard

  1. 1.Go to Settings → Connections in your Sesquatch dashboard
  2. 2.Click "Connect AWS Account"
  3. 3.Enter a name for this connection (e.g., "My AWS Connection")
  4. 4.Select your AWS region
  5. 5.Click "Continue" to see the IAM role setup options
Connection wizard step 1 showing name and region fields

Step 2: Create the IAM Role

Choose your preferred method to create the IAM role in AWS.

Option A: Launch Stack (Recommended)

  1. 1.Click the "Launch Stack in AWS" button
  2. 2.You'll be redirected to the AWS CloudFormation console with the template pre-loaded
  3. 3.Review the stack details (the External ID is already filled in)
  4. 4.Check the box acknowledging IAM resource creation and click "Create stack"
  5. 5.Wait for the stack status to show CREATE_COMPLETE

Option B: Manual Setup

  1. 1.Click "Copy Template" to copy the CloudFormation JSON
  2. 2.Expand "View CloudFormation Template" to see and copy the template
  3. 3.Open the AWS CloudFormation console
  4. 4.Click "Create stack" → "With new resources (standard)"
  5. 5.Select "Upload a template file" and paste the copied template
  6. 6.Complete the stack creation wizard

About the External ID

Sesquatch generates a unique External ID for each connection. This ID is embedded in the CloudFormation template and prevents the "confused deputy" security problem. The External ID is shown in Step 2 of the wizard for your reference.

Connection wizard step 2 showing Launch Stack and manual setup options

Step 3: Enter the Role ARN

After the CloudFormation stack completes, you need to copy the Role ARN back to Sesquatch.

  1. 1.In the AWS CloudFormation console, click on your completed stack
  2. 2.Go to the Outputs tab
  3. 3.Copy the RoleArn value (it looks like arn:aws:iam::123456789012:role/SesquatchSESRole)
  4. 4.Paste the Role ARN in Sesquatch
  5. 5.Click "Connect AWS Account" to complete the setup

Sesquatch will verify the connection by assuming the role. If successful, your AWS account is connected and ready to use.

Connection wizard step 3 showing Role ARN input field

What Gets Created

The CloudFormation template creates the following resources in your AWS account:

IAM Role: SesquatchSESRole

Allows Sesquatch to assume this role using your unique External ID.

IAM Policy: SesquatchSESPolicy

Grants minimal SES permissions: create, update, delete, list, and send templates.

To revoke access, simply delete the CloudFormation stack or the IAM role from your AWS account.

Troubleshooting

"Access Denied" Error

This usually means the Role ARN is incorrect or the CloudFormation stack didn't complete successfully. Double check the ARN from the Outputs tab and ensure the stack shows CREATE_COMPLETE.

Stack Creation Failed

Check the Events tab in CloudFormation for error details. The most common issues are insufficient IAM permissions to create roles. You may need to contact your AWS administrator.

"Invalid ARN" Error

The Role ARN should be in the format: arn:aws:iam::ACCOUNT_ID:role/ROLE_NAME. Copy it directly from the CloudFormation Outputs tab to avoid typos.

SES Not Available in Region

Not all AWS regions support SES. Make sure SES is enabled in your selected region. Check the AWS SES region availability documentation.