- 入门指南
- 通知
- 许可
- 故障排除
- 连接器生成器
- Act! 365
- ActiveCampaign
- Active Directory - 预览版
- Adobe Acrobat Sign
- Adobe PDF 服务
- Amazon Bedrock
- Amazon Connect
- Amazon Polly
- 亚马逊 SES
- Amazon Transcribe
- Amazon Web Services
- 关于 Amazon Web Services 连接器
- 亚马逊网页服务身份验证
- Anthropic Claude
- Asana
- AWeber
- Azure AI 文档智能
- Azure Maps
- BambooHR
- Box
- Brevo
- Calendly
- Campaign Monitor
- Cisco Webex Teams
- Citrix Hypervisor
- Citrix ShareFile
- 清除位
- Confluence Cloud
- Constant Contact
- Coupa
- CrewAI – 预览版
- Customer.io
- Databricks智能体
- Datadog
- 深度查找
- Deputy
- Discord - 预览
- DocuSign
- 水滴
- Dropbox
- Dropbox Business
- Egnyte
- Eventbrite
- 汇率
- Exchange Server - 预览
- Expensify
- Facebook
- Freshbooks
- Freshdesk
- Freshsales
- Freshservice
- 获取响应
- GitHub
- Gmail
- 谷歌云平台
- Google 文档
- Google 云端硬盘
- Google 表单 - 预览
- Google Maps
- Google 表格
- Google 语音转文本
- Google 文本转语音
- Google Tasks - 预览
- Google Vertex
- Google Vision
- Google Workspace
- GoToWebinar
- Greenhouse
- Hootsuite
- HTTP Webhook - 预览
- HubSpot CRM
- HubSpot Marketing
- HyperV - 预览
- Icertis
- iContact
- Insightly CRM
- Intercom
- Jina.ai
- Jira
- Keap
- Klaviyo
- LinkedIn
- 邮件
- Mailchimp
- Mailgun
- Mailjet
- MailerLite
- Marketo
- Microsoft 365
- Microsoft Azure
- Microsoft Azure Active Directory
- Microsoft Azure AI Foundry
- Microsoft Azure OpenAI
- Microsoft Dynamics 365 CRM
- Microsoft OneDrive 和 SharePoint
- Microsoft Outlook 365
- Microsoft Power Automate
- Microsoft Sentiment
- Microsoft Teams
- Microsoft Translator
- Microsoft Vision
- Miro
- NetIQ eDirectory
- 奥克塔
- OpenAI
- 符合 OpenAI V1 的 LLM
- Oracle Eloqua
- Oracle NetSuite
- PagerDuty
- 贝宝
- PDFMonkey
- Perplexity
- Pinecone
- Pipedrive
- QuickBooksOnline
- Quip
- Salesforce
- Salesforce 代理强制和流程 – 预览
- Salesforce Marketing Cloud
- SAP BAPI
- SAP Cloud for Customer
- SAP Concur
- SAP OData
- SendGrid
- ServiceNow
- Shopify
- Slack
- SmartRecruiters
- Smartsheet
- Snowflake
- Snowflake Cortex
- Stripe
- Sugar Enterprise
- Sugar Professional
- Sugar Sell
- Sugar Serve
- System Center - 预览
- 探戈卡
- Todoist
- Trello
- Twilio
- UiPath Data Fabric – 预览
- UiPath 生成式 AI 活动
- UiPath Orchestrator - Preview
- X(以前称为 Twitter)
- Xero
- WatsonX.ai
- WhatsApp Business
- WOO COMMERCE
- 可行
- Workday
- Workday REST
- VMware ESXi vSphere
- YouTube
- Zendesk
- Zoho Campaigns
- Zoho Desk
- Zoho Mail
- 缩放
- Zoom 信息

Integration Service 用户指南
- 对于访问密钥身份验证方法:
- 访问密钥 ID(用于连接到 Amazon Web Services 的访问密钥)
- 秘密访问密钥(用于连接到 Amazon Web Services 的密钥)
- 临时会话令牌(用于创建 AWS 客户端会话)
- 区域(指定要连接到的 AWS 区域)
- 对于访问密钥承担角色身份验证方法:
- 访问密钥 ID(用于连接到 Amazon Web Services 的访问密钥)
- 秘密访问密钥(用于连接到 Amazon Web Services 的密钥)
- IAM 角色(指定 IAM 角色的名称)
- 临时会话令牌(用于创建 AWS 客户端会话)
- 区域(指定要连接到的 AWS 区域)
- For UiPath Managed Cross-Account Assume Role authentication method:
- IAM 角色 ARN
- External ID
- 区域(指定要连接到的 AWS 区域)
要创建访问密钥承担角色连接,请首先执行以下步骤:
- 导航到AWS 控制台> IAM >角色。
- 选择“创建角色” 。
- 选择“自定义信任策略” 。
- Attach the custom trust
policy, as shown in the following code
section:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "AWS": "<user ARN>" }, "Action": "sts:AssumeRole" } ] }
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "AWS": "<user ARN>" }, "Action": "sts:AssumeRole" } ] } - 添加需要分配给用户的权限。
- 填写所有必填详细信息,然后选择“创建”。
- 运行自动化的 UiPath 机器人必须部署在附加了指定 IAM 角色的 AWS EC2 实例中,如此处所述。
This type of connection uses temporary STS credentials instead of long-term IAM keys to securely access AWS resources (S3, EC2, DynamoDB, Bedrock). You only need to provide minimal inputs and complete a one-time AWS account setup, no IAM access keys or secrets required.
UiPath will create and manage a different IAM user per customer, guaranteeing that the AWS access will be isolated at the UiPath organisation level.
This authentication method supports only one role per customer. You can use the role to create multiple connections, but you cannot create multiple IAM roles for multiple connections.
To create a connection:
- Provide the ARN of the IAM Role that UiPath should assume.
This Role ARN will be incorporated into an IAM user's permissions policy. The IAM user is created and managed by UiPath specifically and isolated for each customer.
-
Configure IAM role's trust policy.
Update the IAM Role trust policy to allow assumption by UiPath’s IAM user.
- UiPath will share the ARN of its IAM user created specifically for your customer account.
- You must add the UiPath IAM user ARN into the Principal element of the role’s trust policy.
- We require an External ID as an extra safety safeguard in third-party access scenarios and to help prevent the confused deputy problem. This can be any string of your choosing. To configure it, add a condition with
sts:ExternalId
as in the example below. The External Id is passed to UiPath during the actual Integration Service connection creation.Example policy format:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "AWS": "<UiPath IAM user ARN>" }, "Action": "sts:AssumeRole", "Condition": { "StringEquals": { "sts:ExternalId": "<your External Id>" } } } ] }
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "AWS": "<UiPath IAM user ARN>" }, "Action": "sts:AssumeRole", "Condition": { "StringEquals": { "sts:ExternalId": "<your External Id>" } } } ] }
- Configure IAM role’s permission policies.
例如:
- S3: List/Get/Put on specific buckets.
- Bedrock: InvokeModel, InvokeModelWithResponseStream.
重要提示:The IAM role must be granted the minimum set of permissions required for your specific use case. For example, if the use case involves reading objects from an S3 bucket, the role should only have read-only access to that specific bucket. A sample policy for such a use case would look as follows:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "s3:GetObject", "s3:ListBucket" ], "Resource": [ "arn:aws:s3:::your-bucket-name", "arn:aws:s3:::your-bucket-name/*" ] } ] }
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "s3:GetObject", "s3:ListBucket" ], "Resource": [ "arn:aws:s3:::your-bucket-name", "arn:aws:s3:::your-bucket-name/*" ] } ] } - Add the Amazon Web Services connection in Integration Service.
- 从左侧栏中选择“Integration Service”。
- 从“连接器”列表中,选择“ Amazon Web Services ”。 您也可以使用搜索栏来缩小连接器的范围。
- 选择“连接到 Amazon Web 服务” 按钮。
- From the Authentication Type field, select one of the three options: Access key, Access key assume role, or UiPath Managed Cross Account Assume Role. By default, Access key is selected.
-
输入首选身份验证方法所需的凭据,然后选择“连接” 。
- 已添加您的连接。