Skip to content

Add a Cloud Profile (in-app)

How to connect AWS or Azure from inside the Escher app — without touching a CLI.


What's a profile?

A profile is one connection between Escher and a cloud account, subscription, or project. You can have many profiles — one per AWS account, one per Azure subscription — and Escher reasons across all of them at once.

Each profile carries:

  • A name (chosen by you, e.g. prod-aws, analytics-gcp)
  • A status (active / paused / failed-auth)
  • A scope (which regions / locations Escher reads from)
  • A last-refreshed timestamp

Add a profile

  1. Open Settings → Profiles in the app
  2. Trigger the add-profile action
  3. Pick a provider: AWS or Azure
  4. Follow the provider-specific flow below

INFO

The exact menu path to Settings → Profiles and the add-profile control may differ across builds. The functional flow described below — discover existing CLI profiles, enable, test access — is what's stable.


AWS

Escher reads from your existing AWS CLI configuration (~/.aws/credentials and ~/.aws/config). The in-app flow does not ask you to paste an access key — it lists profiles you've already configured locally and lets you enable them one by one.

  1. Click Discover Profiles — Escher scans your local ~/.aws/credentials
  2. Your existing profiles appear with status Discovered
  3. Click Enable on the profile you want
  4. Click Test Access — Escher attempts the read calls it needs
  5. If access is sufficient, status becomes ✓ Connected. If not, Escher tells you which permissions are missing.
  6. Click Done

TIP

If you don't see your AWS profiles listed, they may not exist locally yet. Run aws configure --profile your-profile-name from a terminal first, then click Discover Profiles again.

For the read-only IAM policy Escher needs, see Connect AWS. If you're new to AWS, see AWS setup for first-time founders.


Azure

Escher reads from your active az CLI session.

  1. From a terminal, run az login (if you haven't already today)
  2. In Escher, click Add Profile → Azure
  3. Escher lists every subscription your CLI session can see
  4. Tick the subscriptions you want to enable
  5. Click Test Access — confirms the Reader role on each
  6. Click Done

If a subscription shows ⚠ "Insufficient role," ask whoever administers your tenant to assign the Reader role on that subscription. Security Reader unlocks deeper IAM and storage analysis.


GCP

GCP support is on the roadmap. There is no GCP scanner shipped today — see Connect GCP.


After the profile is connected

Run an estate scan from the app — Escher reads the resources from each connected profile and builds the map. First scan typically takes 3–8 minutes per account.


What's next

Escher — Agentic CloudOps by Tessell