AWS Security Credentials Variations
The add-on currently supports the following Principal Types:
Capabilities and Restrictions
Each Principal Type has different capabilities and restrictions regarding credential lifetime, Single Sign-On (SSO) to the AWS Management Console, Multi-Factor Authentication (MFA) and calling the IAM and STS APIs in turn, see Comparing Features of AWS STS APIs for details.
Principal Type | AWS Documentation | API action | Credential lifetime (min/max/default) | Notes | |
---|---|---|---|---|---|
Federated User | Temporary Security Credentials to Enable Access for Federated Users | GetFederationToken | IAM user: 15m/36hr/12hr Root account: 15m/1hr/1hr | ||
Assume Role | Temporary Security Credentials for Delegating API Access | AssumeRole | 15m/1hr/1hr | ||
IAM User | Temporary Security Credentials to Enable Access for IAM Users | GetSessionToken | IAM user: 15m/36hr/12hr Root account: 15m/1hr/1hr | ||
SAML Federation | Temporary Security Credentials for SAML Federation | AssumeRoleWithSAML | 15m/1hr/1hr | Support for SAML is not on our roadmap, see the resp. FAQ for details |
Create/Edit Connector
To configure an AWS Connector:
- Navigate to the Identity Federation for AWS configuration.
- Click Edit for an existing AWS Connector, or click Create Connector to create a new one.
Complete the following settings:
Account (IAM User) | Select the long-term AWS security credentials to derive temporary AWS security credentials from - see also add/edit accounts below. | ||||||||||||||||
Connector Name | Specify a custom name to identify this connector. | ||||||||||||||||
Principal Type | Select one of the supported principal types:
| ||||||||||||||||
IAM Policy | (Conditional) Specify an IAM Policy (supported for principal types Federated User and Assume Role)
| ||||||||||||||||
Maximum Duration | (Optional) Set the maximum number of seconds temporary credentials based on this connector can be valid - leave empty to use AWS default values | ||||||||||||||||
Groups | (Optional) Grant the permission to use this Connector to one or more of your JIRA or Bamboo groups: Administrators always have permission to use all Connectors.
| ||||||||||||||||
Scope | (Optional) Select System Scope to allow usage of this AWS Connector from elevated code without an active user session (e.g. by other add-ons like Tasks for AWS and Automation with AWS). |
Add/Edit Account
In order to create AWS Connectors, you need to add at least one account resp. IAM User, which provides the required long-term AWS security credentials used to derive temporary AWS security credentials for your Atlassian users, see Create individual IAM users for getting started with this approach.
Required IAM Permissions
To configure an Account (IAM User):
- Navigate to the Identity Federation for AWS configuration.
- Click Edit for an existing AWS Connector, or click Create Connector to create a new one.
- Click Edit for an existing Account (IAM User), or click Add Account to create a new one.
Complete the following settings:
Account Name | Specify a custom name to identify this account. |
Access Key ID | Provide the Access Key ID of your long-term AWS Security Credentials. |
Secret Access Key | Provide the Secret Access Key of your long term AWS Security Credentials. |
How-to Articles
Filter by label
There are no items with the selected labels at this time.