Configuration
To configure an AWS Connector:
- Navigate to the Identity Federation for AWS configuration.
- Click Edit for an existing AWS Connector, or click Create Connector to create a new one.
Complete the following settings:
Account (IAM User) | Select the long-term AWS security credentials to derive temporary AWS security credentials from - refer to Configuring an AWS Access Key for details. | ||||||||||||||||
Connector Name | Specify a custom name to identify this connector. | ||||||||||||||||
Principal Type | Select one of the supported principal types: Capabilities and Restrictions Each principal type has different capabilities and restrictions regarding credential lifetime, Single Sign-On (SSO) to the AWS Management Console, Multi-Factor Authentication (MFA) and calling the IAM and STS APIs in turn, see Comparing Features of AWS STS APIs for details.
| ||||||||||||||||
IAM Policy | (Conditional) Specify an IAM Policy (supported for principal types Federated User and Assume Role)
| ||||||||||||||||
Maximum Duration | (Optional) Set the maximum number of seconds temporary credentials based on this connector can be valid - leave empty to use the AWS default credential lifetime (refer to table Principal Types above for details). | ||||||||||||||||
Groups | (Optional) Grant the permission to use this Connector to one or more of your JIRA or Bamboo groups: Administrators always have permission to use all Connectors.
| ||||||||||||||||
Scope | (Optional) Select System Scope to allow usage of this AWS Connector from elevated code without an active user session (e.g. by other add-ons like Tasks for AWS and Automation with AWS). |
How-to Articles
Filter by label
There are no items with the selected labels at this time.