NEWSetup Guide

One-Click AWS Connect

Connect your AWS account securely in under 60 seconds using IAM roles. No access keys to manage. Revoke anytime.

No Secrets Stored

We never store your AWS credentials. Temporary tokens only.

60-Second Setup

One CloudFormation click. Paste the Role ARN. Done.

Revoke Anytime

Delete the CloudFormation stack to instantly revoke access.

How It Works

1

Go to Settings → AWS SES

In your Transmit dashboard, navigate to Settings and find the AWS SES section. Click the One-Click tab.

2

Select Your AWS Region

Choose the AWS region where you want to use SES. Popular choices are us-east-1 (Virginia), eu-west-1 (Ireland), or ap-south-1 (Mumbai).

3

Click "Launch CloudFormation"

This opens AWS Console with our pre-configured template. Your unique External ID is automatically filled in.

4

Create the Stack

Scroll down, acknowledge the IAM capabilities checkbox, and click Create stack. Wait ~30 seconds for completion.

5

Copy the Role ARN

Once the stack shows CREATE_COMPLETE, go to the Outputs tab and copy the RoleArn value.

6

Paste in Transmit

Paste the Role ARN in Transmit and click Connect. You're done! 🎉

Security Deep Dive

STS AssumeRole

We use AWS Security Token Service to request temporary credentials. These tokens expire after 1 hour and are never stored permanently.

External ID Protection

Your unique External ID prevents the "confused deputy" attack. Only requests with your exact External ID can assume the role.

Scoped Permissions

The IAM role grants only the permissions needed for email operations: SES (sending, identities, configuration), SNS (webhooks), and S3 (inbound storage).

Instant Revocation

Delete the CloudFormation stack to immediately revoke Transmit's access. No credential rotation needed.

AWS Documentation

IAM Role vs Access Keys

IAM Role (Recommended)Access Keys
Credential StorageNone (temporary tokens)Encrypted secrets stored
Rotation RequiredAutomatic every hourManual rotation recommended
Setup Time~60 seconds~5 minutes
RevocationInstant (delete stack)Must delete/rotate keys
Audit TrailCloudTrail shows AssumeRoleCloudTrail shows key usage

Ready to connect?

Set up one-click AWS access in your dashboard.

Go to Settings