<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Assuming a role using in Talend Route when establishing connection with AWS in Talend Studio</title>
    <link>https://community.qlik.com/t5/Talend-Studio/Assuming-a-role-using-in-Talend-Route-when-establishing/m-p/2546141#M149474</link>
    <description>&lt;P&gt;Hi Folks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are correct in your observations between the route components and the standard components. The ability to explicitly assume an IAM role (via Role ARN) is available in standard Talend components such as tSQSConnection, but this capability is not exposed in the mediation (Route) components like cAWSConnection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is due to an architectural difference: Route components are based on Apache Camel and rely on the AWS SDK’s default credential provider chain rather than exposing all authentication options directly in the component configuration. Route components are wrappers for Apache Camel, which prioritizes the AWS Default Credentials Provider Chain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a result, role assumption is still possible, but it must be configured outside of the component itself.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The recommended approach is to configure role assumption at the environment level so that the AWS SDK used by the Route can pick it up automatically.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you require explicit control of role assumption within the job design itself, an alternative would be to use standard Talend Job components (such as tSQSConnection) instead of a Route. However, this would involve a change in design approach.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;You can find the standard components for standard SQS and S3 connections below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;tSQSConnection:&lt;BR /&gt;&lt;A href="https://help.qlik.com/talend/en-US/components/8.0/amazon-sqs/tsqsconnection" target="_blank"&gt;https://help.qlik.com/talend/en-US/components/8.0/amazon-sqs/tsqsconnection&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;tS3Connection:&lt;BR /&gt;&lt;A href="https://help.qlik.com/talend/en-US/components/8.0/amazon-s3/ts3connection" target="_blank"&gt;https://help.qlik.com/talend/en-US/components/8.0/amazon-s3/ts3connection&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Respectfully,&lt;BR /&gt;Qlik Support&lt;/P&gt;</description>
    <pubDate>Sat, 04 Apr 2026 01:02:59 GMT</pubDate>
    <dc:creator>David_Apodaca</dc:creator>
    <dc:date>2026-04-04T01:02:59Z</dc:date>
    <item>
      <title>Assuming a role using in Talend Route when establishing connection with AWS</title>
      <link>https://community.qlik.com/t5/Talend-Studio/Assuming-a-role-using-in-Talend-Route-when-establishing/m-p/2544859#M149439</link>
      <description>&lt;DIV&gt;&lt;P&gt;I am trying to build a route that consumes messages from an AWS SQS queue. To do this, the underlying instance needs to assume an IAM role that has permissions to access the SQS queue. However, the default instance profile does not have access to this queue.&lt;/P&gt;&lt;P&gt;When I review the &lt;STRONG&gt;cAWSConnection&lt;/STRONG&gt; component, I do not see any option to specify a role ARN to assume. Similarly, the &lt;STRONG&gt;cAWSSQS&lt;/STRONG&gt; component does not provide a way to supply a role ARN directly; instead, it only allows referencing an AWS connection component. The documentation I reviewed is here:&lt;BR /&gt;&lt;A href="https://help.qlik.com/talend/en-US/mediation-components/8.0/mediation-amazon-sqs/amazon-sqs-component" target="_blank" rel="noopener"&gt;https://help.qlik.com/talend/en-US/mediation-components/8.0/mediation-amazon-sqs/amazon-sqs-component&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The ability to explicitly assume a role using a role ARN does exist in the &lt;EM&gt;standard&lt;/EM&gt; components—for example, the standard SQS connection:&lt;BR /&gt;&lt;A href="https://help.qlik.com/talend/en-US/components/7.3/amazon-sqs/tsqsconnection-standard-properties" target="_blank" rel="noopener"&gt;https://help.qlik.com/talend/en-US/components/7.3/amazon-sqs/tsqsconnection-standard-properties&lt;/A&gt;&lt;BR /&gt;and the standard S3 connection:&lt;BR /&gt;&lt;A href="https://help.qlik.com/talend/en-US/components/7.3/amazon-s3/ts3connection-standard-properties" target="_blank" rel="noopener"&gt;https://help.qlik.com/talend/en-US/components/7.3/amazon-s3/ts3connection-standard-properties&lt;/A&gt;&lt;/P&gt;&lt;P&gt;However, this capability appears to be missing from &lt;STRONG&gt;cAWSConnection&lt;/STRONG&gt; when used in a Route.&lt;/P&gt;&lt;P&gt;Since I cannot use static access keys (access key/secret key), and the default instance profile cannot be granted direct access to the SQS queue, could someone please advise how to explicitly assume an IAM role using its ARN when creating a Route?&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 16 Mar 2026 08:03:47 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Talend-Studio/Assuming-a-role-using-in-Talend-Route-when-establishing/m-p/2544859#M149439</guid>
      <dc:creator>tejib</dc:creator>
      <dc:date>2026-03-16T08:03:47Z</dc:date>
    </item>
    <item>
      <title>Re: Assuming a role using in Talend Route when establishing connection with AWS</title>
      <link>https://community.qlik.com/t5/Talend-Studio/Assuming-a-role-using-in-Talend-Route-when-establishing/m-p/2546141#M149474</link>
      <description>&lt;P&gt;Hi Folks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are correct in your observations between the route components and the standard components. The ability to explicitly assume an IAM role (via Role ARN) is available in standard Talend components such as tSQSConnection, but this capability is not exposed in the mediation (Route) components like cAWSConnection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is due to an architectural difference: Route components are based on Apache Camel and rely on the AWS SDK’s default credential provider chain rather than exposing all authentication options directly in the component configuration. Route components are wrappers for Apache Camel, which prioritizes the AWS Default Credentials Provider Chain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a result, role assumption is still possible, but it must be configured outside of the component itself.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The recommended approach is to configure role assumption at the environment level so that the AWS SDK used by the Route can pick it up automatically.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you require explicit control of role assumption within the job design itself, an alternative would be to use standard Talend Job components (such as tSQSConnection) instead of a Route. However, this would involve a change in design approach.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;You can find the standard components for standard SQS and S3 connections below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;tSQSConnection:&lt;BR /&gt;&lt;A href="https://help.qlik.com/talend/en-US/components/8.0/amazon-sqs/tsqsconnection" target="_blank"&gt;https://help.qlik.com/talend/en-US/components/8.0/amazon-sqs/tsqsconnection&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;tS3Connection:&lt;BR /&gt;&lt;A href="https://help.qlik.com/talend/en-US/components/8.0/amazon-s3/ts3connection" target="_blank"&gt;https://help.qlik.com/talend/en-US/components/8.0/amazon-s3/ts3connection&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Respectfully,&lt;BR /&gt;Qlik Support&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2026 01:02:59 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Talend-Studio/Assuming-a-role-using-in-Talend-Route-when-establishing/m-p/2546141#M149474</guid>
      <dc:creator>David_Apodaca</dc:creator>
      <dc:date>2026-04-04T01:02:59Z</dc:date>
    </item>
  </channel>
</rss>

