Difference between revisions of "Aws sts assume-role"
Jump to navigation
Jump to search
Line 29: | Line 29: | ||
* {{aws sts assume-role}} | * {{aws sts assume-role}} | ||
* {{aws sts}} | * {{aws sts}} | ||
− | * {{AWS | + | * {{AWS roles}} |
[[Category:AWS]] | [[Category:AWS]] |
Revision as of 15:47, 21 November 2023
aws sts assume-role
(doc, API ref)
aws sts assume-role --role-arn your_role
aws sts assume-role --role-arn your_role --role-session-name XXXX
aws sts assume-role --role-arn your_role --role-session-name XXXX --serial-number yyyyy --token-code your-token
aws sts get-session-token --profile
--role-arn <value> --role-session-name <value> --duration-seconds <value> The maximum session duration setting can have a value from 1 hour to 12 hours --source-identity
Related
- AWS IAM role
aws iam enable-mfa-device
aws sts assume-role-with-saml
sts:AssumeRole
- Maximum session duration
assumed-role/
- aws sts get-caller-identity
- aws iam get-role
Activities
See also
aws sts assume-role
,assumed-role/, arn:aws:sts
- AWS STS
(sts:)
,aws sts
[get-session-token
|get-caller-identity
|assume-role | assume-role-with-web-identity | assume-role-with-saml | get-access-key-info ]
- AWS IAM role, AWS service roles, AWS IAM Roles Anywhere: [
list-roles | get-role | create-role | put-role-policy | create-service-linked-role | attach-role-policy | update-role | add-role-to-instance-profile ], aws ec2 describe-iam-instance-profile-associations ]
, IAM roles for EC2 instances,AWSServiceRoleForAutoScaling
Advertising: