Difference between revisions of "AWS Security Token Service (STS)"
Jump to navigation
Jump to search
Line 12: | Line 12: | ||
* <code>[[AssumeRoleWithWebIdentity]]</code> | * <code>[[AssumeRoleWithWebIdentity]]</code> | ||
* [[AWS SAML]] | * [[AWS SAML]] | ||
+ | |||
+ | eksctl get cluster | ||
+ | Error: checking AWS STS access – cannot get role ARN for current session: operation error STS: [[GetCallerIdentity]], failed to sign request: failed to retrieve credentials: failed to refresh cached credentials, no [[EC2 IMDS]] role found, operation error [[ec2imds]]: GetMetadata, request send failed, Get "http://169.254.169.254/latest/meta-data/iam/security-credentials/": dial tcp 169.254.169.254:80: i/o timeout | ||
== See also == | == See also == |
Revision as of 16:55, 5 September 2022
Since 2015 available in every region https://aws.amazon.com/blogs/security/aws-security-token-service-is-now-available-in-every-aws-region/
Activities
- Read sts blog: https://aws.amazon.com/blogs/security/tag/aws-sts/
- Read StackOverflow related questions: https://stackoverflow.com/questions/tagged/aws-sts?tab=Votes
Related
eksctl get cluster Error: checking AWS STS access – cannot get role ARN for current session: operation error STS: GetCallerIdentity, failed to sign request: failed to retrieve credentials: failed to refresh cached credentials, no EC2 IMDS role found, operation error ec2imds: GetMetadata, request send failed, Get "http://169.254.169.254/latest/meta-data/iam/security-credentials/": dial tcp 169.254.169.254:80: i/o timeout
See also
Advertising: