0% found this document useful (0 votes)
21 views2 pages

Sts

Uploaded by

Venky
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views2 pages

Sts

Uploaded by

Venky
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

assume-role-policy

{
"Version": "2012-10-17",
"Statement": {
"Effect": "Allow",
"Action": "sts:AssumeRole",
"Resource": "arn:aws:iam::992382596358:role/IAM_ROLE"
}
}

{
"Version": "2012-10-17",
"Statement": {
"Effect": "Allow",
"Principal": {
"AWS": "123456789012"
},
"Action": "sts:AssumeRole"
}
}

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::992382596358:user/serviceuser"
},
"Action": "sts:AssumeRole",
"Condition": {}
}
]
}

aws sts get-caller-identity

aws sts assume-role --role-arn "arn:aws:iam::992382596358:role/IAM_ROLE" --role-


session-name service_user_session --duration-seconds 120 --profile service-profile

aws sts assume-role --role-arn "arn:aws:iam::992382409176:role/811-S3-STS-Role" --


role-session-name service_user_s3_session

export AWS_ACCESS_KEY_ID=RoleAccessKeyID
export AWS_SECRET_ACCESS_KEY=RoleSecretKey
export AWS_SESSION_TOKEN=RoleSessionToken

set AWS_ACCESS_KEY_ID=ASIAVOH5JUC3MYZFZ5UX
set AWS_SECRET_ACCESS_KEY=3nlPlNPktzZwroJAkMwQ1B2SuUQ7pzdJaSAv9IF3
set
AWS_SESSION_TOKEN=IQoJb3JpZ2luX2VjEE0aCmFwLXNvdXRoLTEiRzBFAiEAjN/ntdEtPV1NoK54rBguf
jvxA4IaEyvrtCNyMv+5IMgCIAiPQGueZoFBFKItqX4d3tn0kKcV8SMCzqcz7fm+h2lYKpgCCFYQABoMMzc0
MTkzMzY1MTc0IgxGPIktg5RAioABA0oq9QHpidM77Lq5j0eyaFJRjpqD1WTKcvm26bEzV+Rb77RX0cbfPQ4
gQHsFp91Sc9Qi84OFiQ13k+ZcGSI5uL3e1wYrVAM8DPpeaHVOOxEL97Q5/Z1Iu09w4wUuiZ90qppdg/
jKoCNlbZXLvUtejGGzVl1uiOGdTuseeIP3YiZIFH/xLsf9oF16JqFf77N5J8AlVeJ3hBP7AU//
UNUYL1KnsyZPl/+6Ls9KwilGmmiNYOfStXgaSggPbOI/
JLpOsSzY26RTsHDt71Rj6SN4pMG5DE8F7Z2VuA+sj436NOPIhIcjjY49ZKiZr6mwc1WIv46VWfjSAoB/
WjCk2sSvBjqdAfMzJ5gRJsx92UlPgECALY5zeDtduONOSCoVlEUG+GV867y0NHs1W5Ee72jkYORCLW8thf4
Tjr20pL3IGGN6b6lyGK7u6hRayZL9Apkf1RVF7BFKzUo2WIeVLSeQsHngF6OEvWd1aY4Y54ospNljWw27fQ
ArYgvkiq8SEi57E0d5T2tFPRPaXjAncYEaPA0LmilBsdhLyxoJFUbHWqI=

E:\>aws sts get-caller-identity


{
"UserId": "AROAVOH5JUC3H2ZTQKZE4:cli-Session",
"Account": "374193365174",
"Arn": "arn:aws:sts::374193365174:assumed-role/789CurrentAccountRole/cli-
Session"
}

to logout from session

SET AWS_ACCESS_KEY_ID=
SET AWS_SECRET_ACCESS_KEY=
SET AWS_SESSION_TOKEN=

You might also like