Why Clazar Requests Access for Co-Sell Roles in Your AWS Environment
Last updated: June 25, 2025
To enable seamless co-sell workflows with AWS and support the APN CRM onboarding process, Clazar provisions a secure set of roles in your environment. This support article explains what access is requested by the Clazar Co-Sell Roles Stack why is it necessary, and how do we ensure security and control throughout the process?
🔍 What This Stack Does
The Clazar Co-Sell Roles Stack provisions roles and supporting infrastructure to automate co-sell data syncing between your AWS account and Clazar’s backend, particularly for use in AWS Partner Network (APN) CRM processes.
🚀 Key Components Deployed
1. IAM Roles for Co-Sell Environments
Roles Created:
SandboxRoleProductionRole
Purpose: These roles allow Clazar to securely interact with your APN CRM data for sandbox and production usage.
Scoped Access: The roles are created using a secure external ID and are limited to predefined permissions relevant to APN CRM onboarding.
2. Reporter Lambda Function
Component: A Lambda function called
ClazarCosellReporterFunction.Purpose: Used to report co-sell resource creation and sync details between your AWS account and Clazar’s API.
Security: The function is deployed with a limited-role IAM execution policy to prevent over-privileged access.
3. Custom Resource Invocation
What It Does: After provisioning the above resources, this component calls Clazar’s backend API with metadata and resource identifiers to complete onboarding.
Secure Handshake: Uses a one-time secret key and AWS account metadata to authenticate the call.
🛡 Why This Access Is Required
Component | Need | What Clazar Does |
IAM Roles (Sandbox & Production) | Required by AWS APN CRM to process co-sell records | Secure access for pushing CRM data to AWS |
Reporter Function | Sync stack metadata with Clazar API | Triggers post-deployment configuration & validation |
Clazar API Callback | Ensure successful onboarding with real-time validation | Receives stack metadata, role ARNs |
🧩 Optional Role Reuse
If you already have existing IAM roles for sandbox and production:
You can pass their ARNs directly into the stack parameters.
Clazar will not create new roles and will instead reuse what’s provided.
🔐 Security & Compliance Highlights
Scoped Role Access: IAM permissions are limited to AWS co-sell workflows and never grant unnecessary access.
External ID: Prevents unauthorized cross-account access by enforcing AWS security best practices.
Ephemeral Secret: This
ClazarSecretKeyis a one-time, time-bound secret for authenticating the deployment.Auditability: All CloudFormation resources and permissions are fully reviewable before deployment.
⚙ Configurable Parameters
Parameter Description | |
| ARN or name of the sandbox IAM role |
| ARN or name of the production IAM role |
| Secure ID used by Clazar to assume the roles |
| One-time secret used to authenticate the deployment |
| Unique identifier for your Clazar account |
💬 Need Assistance?
If you're unsure about the role permissions or how to tailor the stack for your environment, reach out to our support team. We're happy to assist with reviews or walkthroughs with your security team.