We need to access APIs in a corporate backend that accept calls only from authorised IP addresses.
At this moment our mobile clients are calling an AWS Lambda function that performs some transformations and then calls another service on an EC2 instance that has the authorised public IP address assigned. This second service performs the final call to the corporate backend returning the data to the lambda and then to the clients.
This is working fine, but it adds some unnecessary complexity to the architecture that we wish to avoid.
Is it possible to assign the public IP to the lambda function somehow to avoid having this extra service in EC2?
Thanks,
GA