Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Excerpt

10 November 2014

The Utoolity team is pleased to present Identity Federation for AWS 2.1 – this release adds a new principal type 'Assume Role' to support IAM roles for delegating API access to AWS resources in other accounts (cross-account usage) and enabling API access to the IAM service itself.

Learn more and try it for free in:

On this page:

Table of Contents
maxLevel3

Highlights

Panel
borderColor#F3F3F3
bgColor#FAFAFA
borderWidth1

Third Principal Type 'Assume Role'

Use temporary credentials for configured IAM roles to delegate API access to AWS resources in other accounts (cross-account usage) and enable API access to AWS Identity and Access Management (IAM) itself.

Details

This release addresses the following issues:

  • Stories

    • IFAWS-48 (UAA-32) - As an administrator, I want to facilitate the AssumeRole API so that I gain configuration via AWS and cross-account IAM usage

  • Bugs

    • IFAWS-293 - Fix CSS regression for large inline dialog buttons in JIRA 6.3

    • IFAWS-315 - Fix obsolete constraint for Elastic Beanstalk in principal type inline dialog help

Updates

Release 2.1.2

This release addresses the following issues:

  • Bugs

    • IFAWS-359 - Fix redirect to connector REST endpoints on login in Bamboo

Release 2.1.1

This release addresses the following issues:

  • Improvements

    • IFAWS-289 - Prevent Federation Error due to PackedPolicyTooLargeException

  • Bugs

    • IFAWS-70 (UAA-57) - Fix infinite redirect when logged in non admin user tries to access an admin page

    • IFAWS-80 - Fix missing placeholder value replacement in license error message

    • IFAWS-128 - Fix menu error message for invalid license

    • IFAWS-335 - Fix CSS regression for large inline dialog buttons in Bamboo 5.7

    • IFAWS-336 - Fix error message on license mismatch

    • IFAWS-337 (UAA-55) - Fix feature discovery dialog blocking buttons