- Newest
- Most votes
- Most comments
Hello.
I hope the steps in the document below will be helpful.
The steps in the document below use "aws sts assume-role" to obtain temporary credentials from an IAM role.
Rather than creating an authentication file, it is registered in an environment variable.
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_use-resources.html#using-temp-creds-sdk-cli
Hello,
The official documentation states that storing temporary credentials in credential files is acceptable [1]. However, instead of updating the file each time the short-term credentials expire, consider exporting them as environment variables [2]. This avoids repeatedly editing the credential file.
[1] https://docs.aws.amazon.com/cli/v1/userguide/cli-authentication-short-term.html
Relevant content
- asked 5 years ago
- asked a year ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 5 months ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated a year ago
If you run the "aws sts assume-role" command in CloudShell to check the authentication information and set it as an environment variable on your local PC, you will no longer need to issue a permanent access key for the IAM user. https://docs.aws.amazon.com/cloudshell/latest/userguide/welcome.html