diff --git a/notes/aws/assume-role-credentials.md b/notes/aws/assume-role-credentials.md new file mode 100644 index 0000000..607c359 --- /dev/null +++ b/notes/aws/assume-role-credentials.md @@ -0,0 +1,32 @@ +--- +title: Get credentials for an assumed role +tags: + - AWS +link: https://aws.amazon.com/premiumsupport/knowledge-center/iam-assume-role-cli/ +emoji: 🔑 +--- + +It's often useful to get regular access keys as if you were assumed into another role. This is possible: + +``` +aws sts assume-role --role-arn arn:aws:iam:::role/ --role-session-name +``` + +This produces JSON output (it's the most readable of the 3 `aws` supports): + +```json +{ + "Credentials": { + "AccessKeyId": "xxxxxxxxxxxxxxx", + "SecretAccessKey": "xxxxxxxxxxxxxxxxxxxxxxxxxx", + "SessionToken": "xxxxxxxxxxxxxxxxxxxxxxxxxx", + "Expiration": "2022-09-13T17:18:44Z" + }, + "AssumedRoleUser": { + "AssumedRoleId": "xxxxxxxxxxxxxxxx:", + "Arn": "arn:aws:sts:::assumed-role//" + } +} +``` + +See also the [`assume-role`](https://docs.aws.amazon.com/cli/latest/reference/sts/assume-role.html) command's docs