- Newest
- Most votes
- Most comments
Hello.
Is the IAM user performing that operation?
If you are operating as an IAM user, there is a possibility that the policy is insufficient.
Furthermore, even if you are using the root user, such an error may occur if operations are restricted by Organizations SCP, etc.
https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html
Hi, bgbs. Do you use IaC for provisioning certificates and provisioning of CloudFront like Terraform or Cloudfromation?
No, Cloudfront Distributiuons are manually provisioned via the admin panel with the root user. I have 1 IAM user with permission AmazonRoute53FullAccess which i use to issue Let's Encrypt SSL with 3rd party service, where i add the Access key and Secret of this IAM user. That Access Key was created 55 days ago.
Thanks for your answer. Could you please confirm that the certificate is still valid and not expired?
The error shows in all distributions i have, and even when i start creating a new distribution, before even deploying it All SSL certificates are valid. Expiring at the end of next year.
This is clearly a bug but Amazon don't appear to have a feedback page. I worked around it using help from this page Update cloudfront configuration using awscli https://stackoverflow.com/a/66960593
Relevant content
- asked a year ago
- asked 3 years ago
- How do I resolve the IAM credentials error "The security token included in the request isn’t valid"?AWS OFFICIALUpdated 7 months ago
- AWS OFFICIALUpdated 3 months ago
- AWS OFFICIALUpdated 5 months ago
- AWS OFFICIALUpdated 7 months ago
Hi,
No, as i explained the Root user is performing. IAM user only has AmazonRoute53FullAccess Permissions and Console Access disabled. IAM user is only used for dns-01 let's encrypt validation.