AWS Credentials Sources
This results in two option for providing AWS Security Credentials:
Identity Federation for AWS
Tip |
---|
title | Federated Amazon Web Services access |
---|
|
This is the recommended approach to share and manage AWS credentials: - It provides benefits like easy credentials sharing and reuse, fine grained access control for AWS resources, strong encryption and more (please refer to the Identity Federation for AWS Documentation for more information regarding the available features and implied advantages).
|
Image AddedPlease refer to the Identity Federation for AWS Administrator's Guide for details on how to configure the connectors.
- this option requires at least one AWS Connector to be configured with System Scope to allow usage from Bamboo builds, where no user session is available
- a connector yields a set of temporary credentials on task execution (optionally limiting the IAM permissions)
- you can configure multiple connectors to provide credentials with different IAM permissions tailored for specific use cases
Inline
Note |
---|
|
This is not recommended, but easy to get started with: - The common pair of AWS security credentials (an AWS Access Key Id and an AWS Secret Key) is entered directly in each task and persisted after being processed with the Bamboo
|
Encryption Image Removed- Please note that this naming is misleading for the time being - as properly phrased in the method details, these just provide means to obfuscate sensitive data. Real encryption is available by using the integration with Identity Federation for AWS (Bamboo) instead.
Include Page |
---|
_CNRegionsNote | _CNRegionsNote Insert excerpt |
---|
| _BambooEncryptionServiceAPINote |
---|
| _BambooEncryptionServiceAPINote |
---|
nopanel | true |
---|
|
|
Image AddedIf you prefer this solution, you might still want to ease credentials reuse a bit via variable substitution as follows:
- configure Access Key and Secret Key as e.g.
${bamboo.awsAccessKeyPassword}
and ${bamboo.awsSecretKeyPassword}
- define plan and/or global variables for the configured variable names (i.e.
awsAccessKeyPassword
and awsSecretKeyPassword
given this example) with the actual credentials, which will then be substituted on task execution accordingly
Identity Federation for AWS
Tip |
---|
title | Federated Amazon Web Services access |
---|
|
This is the recommended approach to share and manage AWS credentials: It provides all sorts of benefits like easy credentials sharing and reuse, fine grained access control for AWS resources, strong encryption and more. Please refer to the Identity Federation for AWS Documentation for details. |
Image RemovedPlease refer to the Identity Federation for AWS Administrator's Guide for details on how to configure the connectors.
- this option requires at least one System Scope AWS Connector to be configured within the Identity Federation for AWS add-on
- a connector yields a set of temporary credentials on task execution (optionally limiting the IAM permissions)
- you can configure multiple connectors to provide credentials with different IAM permissions tailored for specific use cases
AWS China (Beijing) Region
Include Page |
---|
| _ChinaRegionsNote |
---|
| _ChinaRegionsNote |
---|
|
AWS GovCloud (US) Region
Include Page |
---|
| _GovCloudRegions |
---|
| _GovCloudRegions |
---|
|