Connect Cloud Accounts
Cloud integrations are organization-scoped. They provide the live infrastructure context used by:- Cloud compliance scans
- Cloud monitor findings
- Cloud resource inventory and import
- Agent sessions that need cloud-side context
Settings -> Integrations -> Cloud to start.
Current Provider Paths
| Provider | Current product path | Notes |
|---|---|---|
| AWS | Manual credentials in the UI | Best if you create a dedicated read-only IAM user |
| Azure | Quick Connect | Manual credential setup is deprecated after October 1, 2025 |
| GCP | Keyless impersonation or service account key | Keyless impersonation is the preferred path |
| OCI | Manual credentials in the UI | Uses tenancy, user, fingerprint, and private key |
Principle: Read First, Write Never
For onboarding and scanning, Cloudgeni is designed around read access to your cloud estate. The product reads live state, runs scans, and uses that context to open repository changes later. It is not supposed to apply infrastructure changes directly in your cloud account.AWS
The current UI exposes the manual credential path. Use a dedicated IAM user with read-only access:AccessKeyId and SecretAccessKey into the AWS integration form.
Azure
As of March 11, 2026, the supported path is Quick Connect. The codebase still contains a manual credential screen, but that path is explicitly marked deprecated after October 1, 2025 and should not be your default recommendation. If you need to understand the minimal manual privilege shape, it is a subscription-scoped Reader service principal:GCP
The current app supports two modes:- Keyless impersonation
- Service account key upload
cloudgeni-platform-sa@cloudgeni-production.iam.gserviceaccount.com
Minimal impersonation example:
OCI
OCI currently uses the manual setup path in the UI. You need a dedicated user, an API key pair, and a policy that grants read access to the tenancy or compartment you want Cloudgeni to inspect.After The Account Is Connected
The next useful actions are:- Run Cloud Compliance for framework-based posture scans
- Review Cloud Monitors for native provider findings
- Open Cloud Resource Import if you want to recover IaC from live resources
What To Check If Setup Fails
- Integration is present but not useful: verify the account really has enough read scope for the resources you expect
- No findings or inventory appear: run a sync or scan from the integration page after the connection becomes active
- Agent work lacks cloud context: make sure you selected the cloud account when launching the session, not just connected it earlier