Principal Type | Explanation | Learn more at AWS |
---|---|---|
Federated User | Yields temporary AWS security credentials for a federated user with the Atlassian user name and an optional IAM policy (if absent, AWS applies a default) In order to use the Federated User Principal Type, you need to Grant an IAM Group Permission to Create Temporary Credentials! The following example shows a policy that grants permission to access the AWS STS { "Version": "2012-10-17", "Statement": [{ "Effect": "Allow", "Action": "sts:GetFederationToken", "Resource": "*" }] } AWS Elastic Beanstalk is the only remaining service not supported by Federated User yet - use Account (IAM User) instead. | Permissions in Temporary Security Credentials for Federated Users Grant an IAM Group Permission to Create Temporary Credentials |
Account (IAM User) | Yields temporary AWS security credentials for the selected IAM user (recommended) or AWS account (disadvised) itself Account (IAM User) does not allow to specify IAM policies or distinguish users - use Federated User for these features instead. | Permissions in Temporary Security Credentials for IAM Users |
Documentation for Automation with AWS AWS 1.0 – other releases are available in the Automation with AWS Documentation Directory.
View
Unknown macro: {spacejump}
or visit the current documentation home.
General
Content
Integrations