...
Choose Authentication as IAM authentication and fill in the required fields. The username used should be the created in step 3, add the access key and secret key of the IAM user that has the policy created in step 2, then click create connection
...
Verify that credentials and setup are correct by checking if connection object lists will show similar to standard authentication
...