-
Notifications
You must be signed in to change notification settings - Fork 230
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add option to authenticate to MongoDB on AWS via AWS IAM #2019
Milestone
Comments
thjaeckle
added a commit
to beyonnex-io/ditto
that referenced
this issue
Sep 17, 2024
* provide own "driver" for the pekko-persistence plugin * configure AWS IAM based authentication based on the Ditto configuration
thjaeckle
added a commit
to beyonnex-io/ditto
that referenced
this issue
Sep 17, 2024
…o new AwsAuthenticationHelper class
thjaeckle
pushed a commit
to beyonnex-io/ditto
that referenced
this issue
Sep 17, 2024
…o new AwsAuthenticationHelper class
thjaeckle
pushed a commit
to beyonnex-io/ditto
that referenced
this issue
Sep 17, 2024
* provide own "driver" for the pekko-persistence plugin * configure AWS IAM based authentication based on the Ditto configuration * moved common AWS MongoCredential obtaining logic to new AwsAuthenticationHelper class
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
The Java driver of MongoDB is able to authenticate to a MongoDB instance via AWS IAM.
This has the benefit that no username/password, so no credentials have to be configured, rotated, etc.
The default way of doing this authentication however is to add the aws sdk for Java - which has a lot of transitive dependencies.
So the preferred way of doing this authentication would instead be to do a single HTTP API call to the AWS IAM API in order to assume a role.
The text was updated successfully, but these errors were encountered: