One-Click AWS Connect
Connect your AWS account securely in under 60 seconds using IAM roles. No access keys to manage. Revoke anytime.
No Secrets Stored
We never store your AWS credentials. Temporary tokens only.
60-Second Setup
One CloudFormation click. Paste the Role ARN. Done.
Revoke Anytime
Delete the CloudFormation stack to instantly revoke access.
How It Works
Go to Settings → AWS SES
In your Transmit dashboard, navigate to Settings and find the AWS SES section. Click the One-Click tab.
Select Your AWS Region
Choose the AWS region where you want to use SES. Popular choices are us-east-1 (Virginia), eu-west-1 (Ireland), or ap-south-1 (Mumbai).
Click "Launch CloudFormation"
This opens AWS Console with our pre-configured template. Your unique External ID is automatically filled in.
Create the Stack
Scroll down, acknowledge the IAM capabilities checkbox, and click Create stack. Wait ~30 seconds for completion.
Copy the Role ARN
Once the stack shows CREATE_COMPLETE, go to the Outputs tab and copy the RoleArn value.
Paste in Transmit
Paste the Role ARN in Transmit and click Connect. You're done! 🎉
Security Deep Dive
STS AssumeRole
We use AWS Security Token Service to request temporary credentials. These tokens expire after 1 hour and are never stored permanently.
External ID Protection
Your unique External ID prevents the "confused deputy" attack. Only requests with your exact External ID can assume the role.
Scoped Permissions
The IAM role grants only the permissions needed for email operations: SES (sending, identities, configuration), SNS (webhooks), and S3 (inbound storage).
Instant Revocation
Delete the CloudFormation stack to immediately revoke Transmit's access. No credential rotation needed.
AWS Documentation
IAM Role vs Access Keys
| IAM Role (Recommended) | Access Keys | |
|---|---|---|
| Credential Storage | None (temporary tokens) | Encrypted secrets stored |
| Rotation Required | Automatic every hour | Manual rotation recommended |
| Setup Time | ~60 seconds | ~5 minutes |
| Revocation | Instant (delete stack) | Must delete/rotate keys |
| Audit Trail | CloudTrail shows AssumeRole | CloudTrail shows key usage |