-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sample connection profiles for S3 and OpenID Connect Federation #55
Comments
Footnotes |
well, I'd love to req. for the |
This will be the same as this 1 sample with the addition of the custom STS API endpoint defaults to <key>STS Endpoint</key>
<string>http://localhost:9000</string> Footnotes |
Wondering if <key>Provider</key>
<string>aws-s3-sts-azure-activedirectory-oidc</string> always forces f40bc18f-cd02-4212-b7f1-15243e4e2ad3 even if a different one is set. <key>OAuth Client ID</key>
<string>random_uuid</string> |
→ https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html#api_assumerolewithwebidentity
With support to retrieve authentication tokens for S3 using the STS APIs 2 we should provide (sample) connection profiles for typical providers supported.
General connection profile blueprint
🟢 AWS S3/STS + Keycloak (OIDC)
🟢 Minio S3/STS + Keycloak (OIDC)
🟥 AWS S3/STS + GitHub (OIDC) 3 4
Prerequisites
https://token.actions.githubusercontent.com
to AWS IAM. For the Audience: Usests.amazonaws.com
6❗ Currently not possible to integrate because the id-token endpoint does only seem to be accessible from GitHub actions.
🟢 AWS S3/STS + Google (OIDC) 7
996125414232-s922bvdt21nceeh5dq1gb6av8plpj7hr.apps.googleusercontent.com
.In the sample configuration the custom trust policy set for the IAM role in AWS, the condition limits access to a particular Google Account using
SUBJECT_ID
can be obtained from the service account or regular account in the ID token returned fromPOST https://accounts.google.com/o/oauth2/token
decoded as JWT.s3.assumerole.rolearn
in the connection profile to the Role ARN. Set it tos3.assumerole.rolearn=
for a prompt to enter on login.🟥 AWS S3/STS + AWS IAM Identity Center 8
Use the S3 (Credentials from AWS Command Line Interface) connection profile instead.
🟢 AWS S3/STS + Azure AD (OIDC)
https://login.microsoftonline.com/<tenant>/v2.0
. The Audience must be set to the OAuth Client ID likef40bc18f-cd02-4212-b7f1-15243e4e2ad3
.s3.assumerole.rolearn
in the connection profile to the Role ARN. Set it tos3.assumerole.rolearn=
for a prompt to enter on login.Footnotes
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc.html ↩
Suport to login using temporary credentials from Security Token Service (STS API) using OpenID Connect web identity cyberduck#13804 ↩
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html#idp_oidc_Create_GitHub ↩
https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services ↩
https://github.com/organizations/iterate-ch/settings/applications/2282978 ↩
https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#adding-the-identity-provider-to-aws ↩
https://cloud.google.com/storage-transfer/docs/source-amazon-s3#federated_identity ↩
https://docs.aws.amazon.com/pdfs/singlesignon/latest/OIDCAPIReference/ssooidc-api.pdf ↩
The text was updated successfully, but these errors were encountered: