Amazon Bedrock
**Note: **BYOC customers, see next section. When no custom credentials are configured, Freeplay uses its own AWS credentials to call Bedrock models in the Freeplay VPC.Using your own AWS role
If you need Freeplay to call models in your own AWS account — for compliance reasons, to access private models, or to maintain full control over credentials — you can configure AWS assume role authentication. With assume role auth, Freeplay temporarily assumes an IAM role in your AWS account using a short-lived token. You retain full control and can revoke access at any time.How it works
- Freeplay authenticates with an internal AWS role
- That role assumes your AWS role, validated by a shared External ID
- Using the resulting short-lived token, Freeplay calls Bedrock models in your account
The External ID is a shared string you configure both in your AWS trust policy and on the Freeplay Settings > Models page. It prevents unauthorized parties from assuming your role.
Customer setup
Freeplay strongly recommends creating a dedicated, isolated IAM role specifically for Freeplay to access Bedrock. Step 1: Create an IAM role for Freeplay Create a new IAM role in your AWS account with a trust policy that allows Freeplay’s role to assume your role, validated by an External ID. Contact your Freeplay account team to obtain the Freeplay role ARN to use as the Principal in your trust policy. You will also need to generate a unique External ID string — this same string must be configured both in your trust policy and on the Freeplay Settings > Models page. Step 2: Attach a permissions policy Attach the following permissions policy to the role to grant Freeplay access to invoke Bedrock models:- Navigate to Settings > Models in Freeplay
- Under Amazon Bedrock, enter:
- Your IAM role ARN (e.g.,
arn:aws:iam::<your-account-id>:role/<your-role-name>) - The External ID you set in the trust policy
- Your IAM role ARN (e.g.,
- Mark this authentication method as default for the provider
- Save your configuration
BYOC (Bring Your Own Cloud) setup
For customers running Freeplay in their own VPC via BYOC deployment, the authentication flow is simplified:- Freeplay uses an implicit role from AWS IRSA (IAM Roles for Service Accounts) attached to the pod — no Freeplay-managed user or role is involved
- The IRSA role assumes your configured AWS role to retrieve a short-lived token
- The Principal in your trust policy should reference the IRSA role ARN provided during your BYOC onboarding, rather than the standard Freeplay role ARN
- The External ID condition is optional but recommended for BYOC deployments
Google Vertex AI
Default behavior
When no custom credentials are configured, Freeplay uses its own GCP service account to call Vertex AI models.Using your own GCP project
To route Vertex AI requests through your own GCP project, you need to grant Freeplay’s service account permission to create access tokens in your project.Customer setup
Step 1: Grant the Service Account Token Creator role- In the GCP project where your Vertex AI models are hosted, go to IAM & Admin > IAM
- Click Grant Access at the top of the page
- Set the following:
- Principal: Contact your Freeplay account team for the service account email to use
- Role: Service Account Token Creator
- Click Save
Role changes can take 30 seconds to 2 minutes to propagate in GCP. If you see permission errors immediately after saving, wait a moment and try again.
- Navigate to Settings > Models in Freeplay
- Configure your Vertex AI provider settings with your GCP project details
- Mark this authentication method as default for the provider
- Save your configuration

