Skip to content

Commit

Permalink
Update documentation for AWS Assume Role plugin
Browse files Browse the repository at this point in the history
  • Loading branch information
derekwaters committed Aug 10, 2024
1 parent 5e4a587 commit 88509ca
Show file tree
Hide file tree
Showing 2 changed files with 22 additions and 0 deletions.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
22 changes: 22 additions & 0 deletions docs/docsite/rst/userguide/credential_plugins.rst
Original file line number Diff line number Diff line change
Expand Up @@ -150,6 +150,28 @@ This example shows the Metadata prompt for HashiVault Secret Lookup.

8. Click **Save** when done.

.. _ug_credentials_aws_assume_role:

AWS Assume Role Lookup
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
.. index::
pair: credential types; AWS

This plugin allows AWS credential details to assume an AWS IAM role to be used as a credential source.

When **AWS Assume Role lookup** is selected for **Credential Type**, provide the following attributes to properly configure your lookup:

- **AWS Access Key** : provide the access key used for communicating with AWS' IAM role assumption API
- **AWS Secret Key** : provide the secret key used for communicating with AWS' IAM role assumption API
- **External ID** : provide an optional app-specific identifier used for auditing and securing the IAM role assumption
- **AWS ARN Role Name** (required): provide the ARN of the IAM role that should be assumed

Below shows an example of a configured AWS Assume Role credential.

.. image:: ../common/images/credentials-create-aws-assume-role-credential.png
:width: 1400px
:alt: Example new AWS Assume Role credential lookup dialog


.. _ug_credentials_aws_lookup:

Expand Down

0 comments on commit 88509ca

Please sign in to comment.