AWS Credentials Sources
You currently have three options to provide AWS Security Credentials:
Identity Federation for AWS
Tip | ||
---|---|---|
| ||
This is the recommended approach to share and manage AWS credentials:
|
Identity Federation for AWS Administrator's Guide for details on how to configure the connectors.
Please refer to the- this option requires at least one AWS Connector to be configured with System Scope to allow usage from Bamboo builds, where no user session is available
- a connector yields a set of temporary credentials on task execution (optionally limiting the IAM permissions)
- you can configure multiple connectors to provide credentials with different IAM permissions tailored for specific use cases
IAM Role for EC2 (Agent)
IAM Roles for Amazon EC2 to optionally skip credentials configuration all together: if an agent happens to run on an EC2 instance started with an instance profile (IAM role), the tasks can be configured to facilitate those credentials. Of course, the underlying IAM role needs to have a sufficient policy attached to grant the the required permissions for the task at hand.
As of release 2.5, you can useThis feature requires the Amazon EC2 instance running the agent to be started with an EC2 instance profile. There are three different scenarios:
- local agents - requires the hosting Bamboo server itself to run on EC2
- remote/elastic agents - requires the remote agent to run on EC2
- elastic agents - requires the elastic agent to run on EC2
- Elastic Bamboo only supports configuring elastic images with an instance profile as of Bamboo 5.6.
Inline
Note | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
This is not recommended, but easy to get started with:
|
If you prefer this solution, you might still want to ease credentials reuse a bit via variable substitution as follows:
- configure Access Key and Secret Key as e.g.
${bamboo.awsAccessKeyPassword}
and${bamboo.awsSecretKeyPassword}
- define plan and/or global variables for the configured variable names (i.e.
awsAccessKeyPassword
andawsSecretKeyPassword
given this example) with the actual credentials, which will then be substituted on task execution accordingly
AWS China (Beijing) Region
Include Page | ||||
---|---|---|---|---|
|
AWS GovCloud (US) Region
Include Page | ||||
---|---|---|---|---|
|