MyIP Access

Home / Docs / Quick Start Guide

MyIP Access – Quick Start Guide

Overview

MyIP Access automates updates to your AWS Security Groups so your current live IP is always whitelisted for SSH, RDP, or custom ports. No more manual changes in the AWS Console — MyIP Access keeps your access rules current and secure.

Prerequisites

  • An AWS Account with IAM permissions (to create roles and policies)
  • Access to your AWS Management Console
  • At least one Security Group for SSH/RDP access

Step 1 – Create IAM Policy for MyIP Access

Define a least-privilege policy that lets MyIP Access act on the security groups you nominate.

Build the policy

  1. In the AWS Console, open IAM → Policies → Create policy.
  2. Switch to the JSON editor.
  3. Paste the policy JSON below:
{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "ec2:AuthorizeSecurityGroupIngress",
                "ec2:RevokeSecurityGroupIngress",
                "ec2:DescribeSecurityGroups"
            ],
            "Resource": "*"
        }
    ]
}

Click Next, name the policy (for example MyIPAccessSecurityGroupPolicy), and create it.

Step 2 – Create IAM Role for MyIP Access

This role is assumed by MyIP Access whenever an IP sync runs.

Configure the role

  1. Go to IAM → Roles → Create role.
  2. Select Trusted entity type → Another AWS account.
  3. Enter the MyIP Access AWS Account ID shown in your dashboard.
  4. On the permissions page, attach the policy you created in Step 1.
  5. Choose a role name such as MyIPAccessUpdater and create the role.

Trust policy template

After the role is created, confirm the trust policy matches your caller. Use this template as guidance:

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Principal": {
                "AWS": "arn:aws:iam::<myipaccess-aws-account-id>:role/MyIPAccessCallerRole"
            },
            "Action": "sts:AssumeRole"
        }
    ]
}

Replace <myipaccess-aws-account-id> with MyIP Access provided AWS account ID; you can get it from the AWS Integration dashboard.

Step 3 – Connect the Role to MyIP Access

  1. Log in to MyIP Access and open AWS Integrations.
  2. Select Add Integration and paste the new role's ARN.
  3. Choose the security group and ports MyIP Access should manage.
  4. Save. The app validates the role and permissions instantly.

Step 4 – Update Your IP

  1. From the dashboard, select your integration.
  2. Click Update My IP to whitelist your current public IP.
  3. Optionally enable the Auto-Update Scheduler to refresh your IP automatically.

Each update is logged with timestamp, ports, and user so you retain a complete audit trail.

Troubleshooting & Next Steps

  • Access denied? Confirm the IAM role has the policy above.
  • Updates failing? Ensure the integration targets the right security group and region.
  • Need help? Email us at contact@kloudpages.com.

Next, invite teammates and enable Slack or webhook alerts from the integrations page.