Get Cloud Account by Id
GET {{cb_url}}/public-cloud/account-management/v1/orgs/{{cb_org_key}}/cloud_providers/{{cloud_provider}}/accounts/{{cloud_account_id}}
Get Cloud Account by Id
Permissions Required
Permission (.notation name) | Operation(s) |
---|---|
public.cloud.accounts | READ |
RESPONSES
status: OK
{"name":"AWS Account 1","owner_name":"Test","owner_email":"test@testorg.com","environment":"DEV","credential":{"verification_status":"FAIL","verification_code":"CREDENTIAL_ERROR","verification_message":"User: arn:aws:sts::1111111111:assumed-role/mcs-psc-dev-cwp-pc-aws-collector-us-east-1-pod/694be2a6-mcs-psc-dev-cwp-pc-aws-collector-us-east-1-pod is not authorized to perform: sts:AssumeRole on resource: arn:aws:iam::1234567890:role/aws-service-role/spot.amazonaws.com/AWSServiceRoleForEC2Spot (Service: Sts, Status Code: 403, Request ID: 43932730-3fe6-491f-b2be-1f648217ac52, Extended Request ID: null)","last_verified_time":"2023-08-31T15:26:31.085296Z","role_arn":"arn:aws:iam::1234567890:role/aws-service-role/spot.amazonaws.com/AWSServiceRoleForEC2Spot","external_id":"afd5813b-e3c6-471a-b30e-3a8577f89111","application_id":null,"tenant_id":null,"secret_id":null,"secret":null,"secret_expiry":null,"identity_provider_project_no":null,"service_account_email":null,"identity_pool_id":null,"identity_provider_id":null},"last_updated_time":"2023-08-31T15:26:30.703570Z","regions":["us-east-1"],"created_by":"ABCD1234","updated_by":"ABCD1234","event_stream_status":"DISABLED","ssm_document_status":"DISABLED","parent_id":null,"aws_account_joined_method":null,"new_accounts_discovered":false,"aws_account_type":"INDEPENDENT","is_onboarded":true,"account_discovery_status":null,"parent_account_id":null,"cloud_provider_account_id":"1234567890","cloud_provider":"AWS"}