Commit 8a40fd6f authored by Jamie Tanna's avatar Jamie Tanna
Browse files

Blogument automagic AWS Assume Role

Via GDS Slack.

Closes #1120.
parent 09e3d8f8
---
title: Automagically Assuming AWS Roles for EC2/ECS
description: How to set up your AWS infrastructure to automagically assume IAM roles.
tags:
- blogumentation
- aws
image: /img/vendor/AmazonWebservices_Logo.png
date: 2021-12-02T17:20:42+0000
license_prose: CC-BY-NC-SA-4.0
license_code: Apache-2.0
slug: aws-auto-role-assume
---
If you're managing AWS infrastructure, it's very likely you're deploying services onto AWS EC2/ECS and using IAM roles to restrict the amount of access each instance has.
You may find that you're always assuming the same roles, and that to save time, you want to auto-assume the role.
Fortunately, you can set this up using the `role_arn` and `credential_source` parameters:
```sh
aws configure set role_arn ${DEPLOYER_ROLE_ARN}
# either of the below
aws configure set credential_source Ec2InstanceMetadata
aws configure set credential_source EcsContainer
```
Note that isn't always a good idea, as you may have lots of other roles to assume, so can't have a specific role as the primary one, or you may want to protect your infrastructure in the case of a breach, so don't want to fill in the gaps by providing a pre-filled role that an attacker could utilise.
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment