Difference between revisions of "Aws sts assume-role"
Jump to navigation
Jump to search
Line 25: | Line 25: | ||
== Activities == | == Activities == | ||
* [[Enhance programmatic access for IAM users using a YubiKey for multi-factor authentication]] | * [[Enhance programmatic access for IAM users using a YubiKey for multi-factor authentication]] | ||
+ | * [[Creating a role to delegate permissions to an IAM user]] | ||
== See also == | == See also == |
Revision as of 15:01, 3 January 2024
aws sts assume-role
(doc, API ref)
aws sts assume-role --role-arn your_role
aws sts assume-role --role-arn your_role --role-session-name XXXX
aws sts assume-role --role-arn your_role --role-session-name XXXX --serial-number yyyyy --token-code your-token
aws sts get-session-token --profile
--role-arn <value> --role-session-name <value> --duration-seconds <value> The maximum session duration setting can have a value from 1 hour to 12 hours --source-identity
Related
- AWS IAM role
aws iam enable-mfa-device
aws sts assume-role-with-saml
sts:AssumeRole
- Maximum session duration
assumed-role/
aws sts get-caller-identity
aws iam get-role
Activities
- Enhance programmatic access for IAM users using a YubiKey for multi-factor authentication
- Creating a role to delegate permissions to an IAM user
See also
aws sts assume-role
,assumed-role/, arn:aws:sts
- AWS STS
(sts:)
,aws sts
[get-session-token
|get-caller-identity
|assume-role | assume-role-with-web-identity | assume-role-with-saml | get-access-key-info ]
- AWS IAM role, AWS service roles, AWS IAM Roles Anywhere: [
list-roles | get-role | create-role | put-role-policy | create-service-linked-role | attach-role-policy | update-role | add-role-to-instance-profile ], aws ec2 describe-iam-instance-profile-associations ]
, IAM roles for EC2 instances,AWSServiceRoleForAutoScaling
Advertising: