AWS IAM: Restrict STS assume-role to specific users

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::555555555555:root"
},
"Action": "sts:AssumeRole",
"Condition": {
"StringEquals": {
"aws:username": [
"jecarter",
"wjclinton",
"bhobama",
"jrbiden"
]
},
"Bool": {
"aws:MultiFactorAuthPresent": "true"
}
}
}
]
}

--

--

--

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

[LeetCode]#1207. Unique Number of Occurrences

Software Testing Economics. Testing Outcomes

Flutter + Firestore: You may be using it wrong.

OOP — Pt. 3 — Object Relationships

Difference Between Those HTTP Requests

Analyzing 🔝 20k Github Repositories

Model vs Template: How I failed as a mentor and what I learned from my mistakes

Crodo VS Ace Starter: Battle Of Launchpads

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Greg Swallow

Greg Swallow

More from Medium

Monitoring Camel-K applications on Openshift using the Fuse Console

Using Sub Workflows in your Workflow — image processing | Orkes Conductor Documentation

SYSALIGN’s SMES SOLUTION

JARVIS: bodyguard at your wrist