aws-assume-role | open source project published by The Scale Factory | AWS library
kandi X-RAY | aws-assume-role Summary
kandi X-RAY | aws-assume-role Summary
This is an open source project published by The Scale Factory. We currently consider this project to be hibernating. These are projects that we’re no longer prioritising, but which we keep ticking over for the benefit of the few customers we support who still use them. :information_source: We’re not regularly patching these projects, or actively watching for issues or PRs. We’ll periodically make updates or respond to contributions if one of the team has some spare time to invest. aws-assume-role is a utility intended for developer and operator environments who need to use 2FA and role assumption to access AWS services. aws-assume-role can store both AWS access keys and ephemeral session tokens in OS credential vaults - Keychain on OSX and Keyring on Gnome.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of aws-assume-role
aws-assume-role Key Features
aws-assume-role Examples and Code Snippets
Community Discussions
Trending Discussions on aws-assume-role
QUESTION
I created an EC2 instance and an EKS cluster in the same AWS account. In order to use the EKS cluster from EC2, I have to grant necessary permissions to it.
I added an instance profile role with some EKS operation permissions. Its role arn is arn:aws:iam::11111111:role/ec2-instance-profile-role
(A) on dashboard. But in the EC2 instance, it can be found as arn:aws:sts::11111111:assumed-role/ec2-instance-profile-role/i-00000000
(B).
ANSWER
Answered 2021-Aug-13 at 05:05- name: external-staging
user:
exec:
apiVersion: client.authentication.k8s.io/v1alpha1
args:
- exec
- test-dev
- --
- aws
- eks
- get-token
- --cluster-name
- eksCluster-1234
- --role-arn
- arn:aws:iam::3456789002:role/eks-cluster-admin-role-e65f32f
command: aws-vault
env: null
QUESTION
In GCP service account inpersonationis a way to create temporary IAM credentials to perform an action as developer (see here). This have been describe as equivalent to assuming a role in AWS , see this other question.
My question is:
is this the recommended/canonical way of doing this in google cloud, namely grouping permissions around service accounts & allowing developers to inpersonate that service account ? Or alternatively is it better to create custom roles and assign them directly to developers identities (and not indirectly via a service account) ? But then of course you lose the advantage of short living credentials.
If the first option is valid it would also mean that you would end up having as many service accounts as roles in AWS.
...ANSWER
Answered 2020-Feb-05 at 03:44In general, you should grant IAM roles to groups, and then add developers to the appropriate groups.
For example, you may want to grant all developers "Editor" access to a project. To do this, grant group:ll-developers@yourcompany.com
the Editor role to the project. Then, use LDAP or G Suite to ensure that all developers are a member of that group.
You can give developers the ability to actAs
a service account, but then the audit logs and principle would be the service account, not the developer.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install aws-assume-role
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page