Skip to main content

Set up AWS SageMaker Unified Studio

Configure AWS authentication to enable Atlan to integrate with AWS DataZone and SageMaker Catalog Unified Studio (SMUS). This enables Atlan to retrieve DataZone metadata and update SMUS assets at source for reverse sync.

Prerequisites

Before you begin, make sure you have:

  • AWS administrator access to create IAM roles, users, and policies
  • Access to your AWS account where SageMaker Catalog Unified Studio is configured
  • Your SMUS domain ID
  • Comma-separated list of SMUS project IDs to enable Atlan sync

Configure AWS authentication

Choose your authentication method based on your security requirements. IAM Role provides enhanced security through temporary credentials, while IAM User uses long-lived access keys.

IAM Role-based authentication uses cross-account trust relationships to enable Atlan to securely assume a role in your AWS account. This method provides enhanced security through temporary credentials.

Get Atlan account node group IAM role

Before setting up the connector, establish a connection between your AWS SMUS instance and your Atlan tenant.

  1. Raise a support ticket to request your Atlan account node group IAM role ARN. In the ticket, include your Atlan instance URL and specify that you need the IAM role ARN for AWS SageMaker Unified Studio integration.

  2. Save the IAM role ARN provided by Atlan support. You need this when deploying the CloudFormation template.

Deploy CloudFormation template

Deploy the CloudFormation template to create all required IAM policies, build the correct trust relationship to the Atlan Node Instance Role, and register an AWS SMUS IAM role user profile required for SMUS sync.

  1. Download the CloudFormation template from GitHub.
  2. Before deploying the CloudFormation template, fill in the following parameters:
    • SMUSDomainId: Your SMUS (SageMaker Catalog Unified Studio) domain ID
    • SMUSProjectsToSync: Comma-separated list of SMUS project IDs to enable Atlan sync
    • AtlanNodeInstanceRoleArn: The IAM Role ARN you obtained from Atlan support
  3. In AWS Console, navigate to CloudFormation > Create stack.
  4. Upload the template and enter the required parameters.
  5. Review and create the stack.
  6. After deployment, CloudFormation generates the following resources:
    • IAM Policy: Custom DataZone access policy required by Atlan SMUS
    • IAM Role: The integration role Atlan assumes to access your DataZone and SMUS environment
    • Trust Relationship: A cross-account trust between your SMUS IAM Role and Atlan Node Instance Role that enables Atlan to assume your SMUS IAM role securely
    • IAM Role added to AWS DataZone Domain and Projects: The stack automatically assigns the IAM Role as a Project Owner for the SMUS project IDs you provided, ensuring Atlan can manage metadata
  7. After deployment, navigate to the CloudFormation stack outputs.
  8. Copy the IAM Role ARN from the outputs and save it. You need this when configuring the AWS SMUS connection inside Atlan.

Share IAM role with Atlan team

Once the role is created, share the IAM Role ARN with the Atlan team:

  1. Raise a support ticket to share the SMUS IAM role ARN. In the ticket, include your Atlan instance URL, the Atlan Node Instance IAM Role provided earlier by Atlan Support, and the IAM Role ARN you created from the CloudFormation stack outputs.

  2. After submitting the ticket, Atlan IT team adds the SMUS IAM role to the Atlan Node IAM Role as an inline policy for sts:AssumeRole operation.

IAM Role authentication

If you configured IAM Role-based authentication, wait for confirmation from the Atlan IT Support team that the SMUS IAM Role has been added to the Node Instance IAM Role for sts:AssumeRole action before proceeding to crawl assets.

Next steps