docs: Change wording for AssumeRole permissions in AWS secrets (#19823)
Co-authored-by: wernerwws <wernerwws@users.noreply.github.com>
This commit is contained in:
parent
bc57865998
commit
71071fd954
|
@ -355,9 +355,10 @@ authentication or single sign-on (SSO) scenarios. In order to use an
|
|||
instance in an IAM instance profile) can retrieve `assumed_role` credentials
|
||||
(but cannot retrieve `federation_token` credentials).
|
||||
|
||||
The `aws/config/root` credentials must have an IAM policy that allows `sts:AssumeRole`
|
||||
against the target role:
|
||||
The `aws/config/root` credentials must be allowed `sts:AssumeRole` through one of
|
||||
two methods:
|
||||
|
||||
1. The credentials have an IAM policy attached to them against the target role:
|
||||
```javascript
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
|
@ -369,9 +370,7 @@ against the target role:
|
|||
}
|
||||
```
|
||||
|
||||
You must attach a trust policy to the target IAM role to assume, allowing
|
||||
the aws/root/config credentials to assume the role.
|
||||
|
||||
1. A trust policy is attached to the target IAM role for the principal:
|
||||
```javascript
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
|
|
Loading…
Reference in New Issue