Use this file to discover all available pages before exploring further.
Before Porter can create a cluster, you need to grant it access to your cloud account. Porter uses secure credential methods that don’t require storing static API keys.
AWS
GCP
Azure
Porter uses AWS IAM role assumption via the AssumeRoleoperation to access your account. You create a role in your AWS account and declare that you trust Porter to assume it. This eliminates static credentials and makes access easy to revoke.
After selecting AWS as your cloud provider, log into your AWS Console and find your 12-digit Account ID in the top-right corner.Enter this ID in Porter and click Grant Permissions.
2
Create the CloudFormation stack
Porter opens the AWS CloudFormation console in a new tab to create a stack that provisions the porter-manager IAM role.
If the popup is blocked, check your browser settings and allow popups from Porter.
Scroll to the bottom of the CloudFormation page, check the I acknowledge that AWS CloudFormation might create IAM resources box, and click Create Stack.Wait for the stack creation to complete (this takes a few minutes).
The IAM role must remain in your AWS account for Porter to manage your infrastructure. Deleting it will prevent Porter from making changes.
First, delete any clusters through the Porter dashboard
Navigate to CloudFormation Stacks in your AWS console
Select the stack named PorterRole and click Delete
This removes the IAM role and prevents Porter from accessing your account.
Porter connects to GCP using a service account with the Project IAM Admin role. You only need to grant this one role and enable two APIs — Porter automatically provisions all other required permissions and APIs.
Before connecting your GCP project to Porter, ensure that a billing account is attached to the project. Porter cannot provision infrastructure in a project without an active billing account.
You can create the service account using our automated script (recommended) or manually.
Option 1: Automated setup (recommended)
If you have the gcloud CLI installed and authenticated (gcloud auth login), run our setup script:
# Download the setup scriptcurl -O https://raw.githubusercontent.com/porter-dev/docs/main/scripts/setup-gcp-porter.sh# Make it executablechmod +x setup-gcp-porter.sh# Run the script (optionally provide your GCP project ID)./setup-gcp-porter.sh [your-gcp-project-id]
The script:
Enables the Cloud Resource Manager API and Service Usage API
Creates a porter-manager service account
Grants the Project IAM Admin role
Downloads a JSON key file
After running the script, upload the generated key file to Porter.
Before creating the service account, enable the following APIs in your GCP Console:
Navigate to APIs & Services
Click Enable APIs and Services
Search for and enable each of these APIs:
Cloud Resource Manager API — required for Porter to manage IAM bindings
Service Usage API — required for Porter to enable all other APIs automatically
Each API may take a few minutes to enable.
The Service Usage API cannot be enabled programmatically if it is not already active — it must be enabled manually through the console or gcloud CLI before Porter can manage other APIs.
In the GCP Console, go to IAM & Admin → Service Accounts.
2
Create the account
Click Create Service Account and enter a name (e.g., porter-manager).
3
Grant permissions
Grant the service account the following role:
Resource Manager > Project IAM Admin
This is the only role you need to grant manually. Porter uses this role to automatically provision all other required IAM bindings (Storage Admin, Compute Admin, Kubernetes Engine Admin, etc.).Click Done to create the account.
4
Create a key
Find your new service account in the list
Under Actions, select Manage keys
Click Add Key → Create new key
Select JSON as the key type
The JSON key file downloads automatically — keep it safe
In Porter, click Drop a GCP Service Account JSON here, or click to browse and upload the JSON key file.Porter verifies the credentials and automatically provisions all required permissions and APIs. This takes about a minute.
If your project has Workload Identity Federation (WIF) enabled, you can migrate an existing service-account JSON connection to WIF without redeploying your clusters. WIF replaces long-lived service-account keys with short-lived federated tokens.
Workload Identity Federation for GCP is currently rolled out per project. If you don’t see the Migrate to Workload Identity Federation button described below, reach out through the support widget to have it enabled.
To migrate:
1
Open the cloud account
In Porter, navigate to Integrations → GCP and open the cloud account you want to migrate.
2
Start the migration
Click Migrate to Workload Identity Federation. Porter generates a one-time setup command and a Cloud Shell deeplink.
3
Run the bootstrap in Cloud Shell
Click the Cloud Shell link, paste the setup command, and run it. The command provisions the Workload Identity Pool, provider, and service account binding in your GCP project via Terraform.Your existing service-account JSON credential keeps authenticating your clusters throughout this step — there is no downtime during migration.
4
Wait for verification
Porter waits for the bootstrap callback and then cuts the cloud account over to the federated identity. The dialog closes automatically once verification succeeds.
After migration, you can safely delete the original service-account key from your GCP project.
You can create the service principal using our automated script (recommended) or manually.
Option 1: Automated setup (recommended)
If you have the Azure CLI installed and authenticated (az login), run our setup script:
# Download the setup scriptcurl -O https://raw.githubusercontent.com/porter-dev/docs/main/scripts/setup-azure-porter.sh# Make it executablechmod +x setup-azure-porter.sh# Run the script (optionally provide subscription ID)./setup-azure-porter.sh [your-subscription-id]
The script:
Enables all required Azure resource providers
Creates the custom porter-aks-restricted role
Creates the service principal with proper permissions
Adds Microsoft Graph API permissions
Grants admin consent (if you have permissions)
Displays the credentials needed for Porter
If the script fails to grant admin consent automatically, grant it manually in the Azure Portal: App registrations > azure-porter-restricted-sp > API permissions > Grant admin consent for Default Directory.
az ad sp create-for-rbac \ --name="azure-porter-restricted-sp" \ --role="porter-aks-restricted" \ --scopes="/subscriptions/${PORTER_AZURE_SUBSCRIPTION_ID}"
Azure requires client secrets to expire every 365 days. When a secret expires, Porter can’t manage infrastructure or deploy updates (existing workloads continue running).To refresh your client secret: