{"id":109164,"date":"2022-06-22T16:17:00","date_gmt":"2022-06-22T20:17:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=109164"},"modified":"2024-08-15T15:13:04","modified_gmt":"2024-08-15T19:13:04","slug":"creating-temporary-credentials-assume-role-aws","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/creating-temporary-credentials-assume-role-aws","title":{"rendered":"Creating Temporary Credentials Using Assume Role in AWS"},"content":{"rendered":"\n

Given that malicious actors and cyber attacks have become commonplace, all risks must be minimized when granting external access to your cloud. While most organizations are aware of the need for vigilance, they aren\u2019t sure how.<\/p>\n\n\n\n

There are many best practices to follow for an AWS integration, but today we\u2019ll be focusing on Assume Role, aka letting third parties assume an IAM role for limited session duration. It works best if you\u2019re using an Identity Provider with AWS. Let\u2019s dive right in.<\/p>\n\n\n\n

What is Assume Role in AWS?<\/h2>\n\n\n\n

Assume Role provides a set of temporary security credentials to access AWS resources you might not have access to in normal conditions. These temporary credentials consist of a security token, an access key ID, and a secret access key.<\/p>\n\n\n\n

The credentials generated by Assume Role can be used in making API calls to AWS services with the following exception: calling the AWS STS GetFederationToken or GetSessionToken API operations.<\/p>\n\n\n\n

How Does an Assume Role Work?<\/h2>\n\n\n\n

When you need to grant external access to a third-party service, it can assume an IAM role to request temporary credentials and access to your AWS resources for a specified session duration. This way, you won\u2019t need to share long-term credentials like a password or access key associated with it with third parties.<\/p>\n\n\n\n

You can securely delegate access to users, services, or applications that normally don\u2019t have access to your resources. For example, you might grant access to your account to a third-party service so that it can operate audits on your resources.<\/p>\n\n\n\n

Advantages of Using Assume Role<\/h2>\n\n\n\n