components icon indicating copy to clipboard operation
components copied to clipboard

Using IAM Role instead of IAM Users

Open sonneym opened this issue 6 years ago • 3 comments

I might be wrong, but when I checked the serverless components are deployed only with user's AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY. It would be nice to be able to support IAM Role and AWS_SESSION_TOKEN. IAM roles usage is a nice best practice, instead of using permanent IAM User credentials.

sonneym avatar Oct 09 '19 16:10 sonneym

That makes sense. We will be updating how we handle credentials soon as we're working on a remote deployment engine. We have support for this planned.

eahefnawy avatar Oct 14 '19 11:10 eahefnawy

Hi @eahefnawy! Any updates related to this issue?

lytvynenko avatar Feb 09 '20 07:02 lytvynenko

Hi all,

could it make sense to directly use the credentials managed by the Serverless Dashboard? when connecting an environment it reports:

Setup your AWS account with an IAM role so Serverless can deploy directly to your account for this stage

it works for base version of Serverless but not for components, it would be nice to manage them in the same way without the need to manage credentials locally.

In my use case I just can't use the IAM user credentials with AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY. We use the assume role feature to jump into organization's accounts and developers don't have the ability to create new users inside "child" account. Basically it is impossible for us to deploy on these infrastructures.

daaru00 avatar Aug 18 '20 09:08 daaru00