[CONJ-877] AWS IAM Credentials Service lacking STS assume role capabilities Created: 2021-05-07 Updated: 2023-10-25 |
|
| Status: | Open |
| Project: | MariaDB Connector/J |
| Component/s: | aurora, authentication |
| Affects Version/s: | None |
| Fix Version/s: | 3.4 |
| Type: | Bug | Priority: | Major |
| Reporter: | Adrian Samatan | Assignee: | Diego Dupin |
| Resolution: | Unresolved | Votes: | 2 |
| Labels: | None | ||
| Description |
|
Right now the AWS IAM Credentials Service only supports the following credentials providers: However, if a user wants to assume a role rather than use the default credentials, he's unable. Support for the STSAssumeRoleSessionCredentialsProvider is needed to be added to the credentials service. |
| Comments |
| Comment by Diego Dupin [ 2021-08-23 ] |
|
I'm not familliar enough with AWS to understand the difference. |
| Comment by Adrian Samatan [ 2021-08-23 ] |
|
Currently one of the AWS STS functionalities (assuming any IAM role to act with its permissions) is not supported. More information about STS: https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html The STSAssumeRoleSessionCredentialsProvider class from the Java SDK is not supported. |
| Comment by Liju [ 2022-03-02 ] |
|
Is there any updates to this issue. We also need this feature to assume another role. As of now the Credential Providers is not configurable in mariadb driver. |
| Comment by Sreedhar Konireddy [ 2022-03-03 ] |
|
We are also in need of this feature to assume role other than the default credentials. |