AWS Security Credentials Variations
The add-on currently supports the following Principal Types:
Info | ||
---|---|---|
| ||
Each Principal Type has different capabilities and restrictions regarding credential lifetime, Single Sign-On (SSO) to the AWS Management Console, Multi-Factor Authentication (MFA) and calling the IAM and STS APIs in turn, see Comparing Features of AWS STS APIs for details. |
GetFederationToken
IAM user: 15m/36hr/12hr
Root account: 15m/1hr/1hr
AssumeRole
GetSessionToken
IAM user: 15m/36hr/12hr
Root account: 15m/1hr/1hr
AssumeRoleWithSAML
Create/Edit Connector
To configure an AWS Connector:
- Navigate to the Identity Federation for AWS configuration.
- Click Edit for an existing AWS Connector, or click Create Connector to create a new one.
Complete the following settings:
Account (IAM User) | Select the long-term AWS security credentials to derive temporary AWS security credentials from - see also add/edit accounts below. | |||||||||||||||||
Connector Name | Specify a custom name to identify this connector. | |||||||||||||||||
Principal Type | Select one of the supported principal types:
| |||||||||||||||||
IAM Policy | (Conditional) Specify an IAM Policy (supported for principal types Federated User and Assume Role)
| |||||||||||||||||
Maximum Duration | (Optional) Set the maximum number of seconds temporary credentials based on this connector can be valid - leave empty to use AWS default values | |||||||||||||||||
Groups | (Optional) Grant the permission to use this Connector to one or more of your JIRA or Bamboo groups:
| |||||||||||||||||
Scope | (Optional) Select System Scope to allow usage of this AWS Connector from elevated code without an active user session (e.g. by other add-ons like Tasks for AWS and Automation with AWS). |
Add/Edit Account
In order to create AWS Connectors, you need to add at least one account resp. IAM User, which provides the required long-term AWS security credentials used to derive temporary AWS security credentials for your Atlassian users, see Create individual IAM users for getting started with this approach.
Info | ||
---|---|---|
| ||
The Federated User and Assume Role principal types require Permissions to Create Temporary Credentials - see the Principal Types table above for details. |
To configure an Account (IAM User):
- Navigate to the Identity Federation for AWS configuration.
- Click Edit for an existing AWS Connector, or click Create Connector to create a new one.
- Click Edit for an existing Account (IAM User), or click Add Account to create a new one.
Complete the following settings:
Account Name | Specify a custom name to identify this account. |
Access Key ID | Provide the Access Key ID of your long-term AWS Security Credentials. |
Secret Access Key | Provide the Secret Access Key of your long term AWS Security Credentials. |
How-to Articles
Filter by label (Content by label) | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
|
Frequently Asked Questions (FAQ)
Questionslist macro | ||||||||
---|---|---|---|---|---|---|---|---|
|