Permission check may fail with this error message:
ERROR: get_assume_role_credentials(aws_utils.py:1337) Could not assume role arn arn:<AWS account ARN:RoleName> from account <CPM Account> (<CPM user>), reason User arn:<AWS account ARN:IAM User name> is not authorized to perform: sts:AssumeRole on resource: arn:arn:<AWS account ARN:RoleName>.
This issue happens because of lack of permissions for the IAM User to access the IAM Role or if there's no trust relationship between the assumed IAM Role side and the assuming IAM user or role.
Assign IAM User 'sts:AssumeRole'
Download the ZIP file from this KB article: https://support.n2ws.com/portal/kb/articles/what-are-the-required-minimal-aws-permissions-roles-for-cpm-operation
Follow the instructions from the article to apply the required permissions.
Configure trust relationship for the IAM Role to the assuming IAM User/Role.
Log in to the AWS console using account where required IAM Role was created, and go to the Identity and Access Management (IAM).
Go to 'Roles' and select the role which requires configuring trust relationship.
Click 'Edit trust relationship'.
Trust relationship should look like this:
After permissions and trust relationship has been set, please check if the initial issue has disappeared.