Difference between revisions of "AWS Security Token Service (STS)"
Jump to navigation
Jump to search
Line 8: | Line 8: | ||
== Related == | == Related == | ||
+ | * <code>[[GetSessionToken]]</code> | ||
* [[Amazon Region]] | * [[Amazon Region]] | ||
* <code>[[sts:AssumeRoleWithSAML]]</code> | * <code>[[sts:AssumeRoleWithSAML]]</code> |
Revision as of 11:01, 14 April 2023
Since 2015 available in every region https://aws.amazon.com/blogs/security/aws-security-token-service-is-now-available-in-every-aws-region/
Activities
- Read sts blog: https://aws.amazon.com/blogs/security/tag/aws-sts/
- Read StackOverflow related questions: https://stackoverflow.com/questions/tagged/aws-sts?tab=Votes
Related
eksctl get cluster Error: checking AWS STS access – cannot get role ARN for current session: operation error STS: GetCallerIdentity, failed to sign request: failed to retrieve credentials: failed to refresh cached credentials, no EC2 IMDS role found, operation error ec2imds: GetMetadata, request send failed, Get "http://169.254.169.254/latest/meta-data/iam/security-credentials/": dial tcp 169.254.169.254:80: i/o timeout
An error occurred (UnrecognizedClientException) when calling the UpdateService operation: The security token included in the request is invalid.
See also
Advertising: