public class AssumeRoleRequest extends AmazonWebServiceRequest implements Serializable, Cloneable
AssumeRole operation
.
Returns a set of temporary security credentials (consisting of an
access key ID, a secret access key, and a security token) that you can
use to access AWS resources that you might not normally have access
to. Typically, you use AssumeRole
for cross-account
access or federation.
Important: You cannot call AssumeRole
by using
AWS account credentials; access will be denied. You must use IAM user
credentials or temporary security credentials to call
AssumeRole
.
For cross-account access, imagine that you own multiple accounts and need to access resources in each account. You could create long-term credentials in each account to access those resources. However, managing all those credentials and remembering which one can access which account can be time consuming. Instead, you can create one set of long-term credentials in one account and then use temporary security credentials to access all the other accounts by assuming roles in those accounts. For more information about roles, see IAM Roles (Delegation and Federation) in Using IAM .
For federation, you can, for example, grant single sign-on access to
the AWS Management Console. If you already have an identity and
authentication system in your corporate network, you don't have to
recreate user identities in AWS in order to grant those user
identities access to AWS. Instead, after a user has been
authenticated, you call AssumeRole
(and specify the role
with the appropriate permissions) to get temporary security
credentials for that user. With those temporary security credentials,
you construct a sign-in URL that users can use to access the console.
For more information, see
Scenarios for Granting Temporary Access
in Using Temporary Security Credentials .
The temporary security credentials are valid for the duration that you
specified when calling AssumeRole
, which can be from 900
seconds (15 minutes) to 3600 seconds (1 hour). The default is 1 hour.
Optionally, you can pass an IAM access policy to this operation. If you choose not to pass a policy, the temporary security credentials that are returned by the operation have the permissions that are defined in the access policy of the role that is being assumed. If you pass a policy to this operation, the temporary security credentials that are returned by the operation have the permissions that are allowed by both the access policy of the role that is being assumed, and the policy that you pass. This gives you a way to further restrict the permissions for the resulting temporary security credentials. You cannot use the passed policy to grant permissions that are in excess of those allowed by the access policy of the role that is being assumed. For more information, see Permissions for AssumeRole, AssumeRoleWithSAML, and AssumeRoleWithWebIdentity in Using Temporary Security Credentials .
To assume a role, your AWS account must be trusted by the role. The
trust relationship is defined in the role's trust policy when the role
is created. You must also have a policy that allows you to call
sts:AssumeRole
.
Using MFA with AssumeRole
You can optionally include multi-factor authentication (MFA)
information when you call AssumeRole
. This is useful for
cross-account scenarios in which you want to make sure that the user
who is assuming the role has been authenticated using an AWS MFA
device. In that scenario, the trust policy of the role being assumed
includes a condition that tests for MFA authentication; if the caller
does not include valid MFA information, the request to assume the role
is denied. The condition in a trust policy that tests for MFA
authentication might look like the following example.
"Condition": {"Bool": {"aws:MultiFactorAuthPresent":
true}}
For more information, see Configuring MFA-Protected API Access in Using IAM guide.
To use MFA with AssumeRole
, you pass values for the
SerialNumber
and TokenCode
parameters. The
SerialNumber
value identifies the user's hardware or
virtual MFA device. The TokenCode
is the time-based
one-time password (TOTP) that the MFA devices produces.
NOOP
Constructor and Description |
---|
AssumeRoleRequest() |
Modifier and Type | Method and Description |
---|---|
AssumeRoleRequest |
clone()
Creates a shallow clone of this request.
|
boolean |
equals(Object obj) |
Integer |
getDurationSeconds()
The duration, in seconds, of the role session.
|
String |
getExternalId()
A unique identifier that is used by third parties when assuming roles
in their customers' accounts.
|
String |
getPolicy()
An IAM policy in JSON format.
|
String |
getRoleArn()
The Amazon Resource Name (ARN) of the role to assume.
|
String |
getRoleSessionName()
An identifier for the assumed role session.
|
String |
getSerialNumber()
The identification number of the MFA device that is associated with
the user who is making the
AssumeRole call. |
String |
getTokenCode()
The value provided by the MFA device, if the trust policy of the role
being assumed requires MFA (that is, if the policy includes a
condition that tests for MFA).
|
int |
hashCode() |
void |
setDurationSeconds(Integer durationSeconds)
The duration, in seconds, of the role session.
|
void |
setExternalId(String externalId)
A unique identifier that is used by third parties when assuming roles
in their customers' accounts.
|
void |
setPolicy(String policy)
An IAM policy in JSON format.
|
void |
setRoleArn(String roleArn)
The Amazon Resource Name (ARN) of the role to assume.
|
void |
setRoleSessionName(String roleSessionName)
An identifier for the assumed role session.
|
void |
setSerialNumber(String serialNumber)
The identification number of the MFA device that is associated with
the user who is making the
AssumeRole call. |
void |
setTokenCode(String tokenCode)
The value provided by the MFA device, if the trust policy of the role
being assumed requires MFA (that is, if the policy includes a
condition that tests for MFA).
|
String |
toString()
Returns a string representation of this object; useful for testing and
debugging.
|
AssumeRoleRequest |
withDurationSeconds(Integer durationSeconds)
The duration, in seconds, of the role session.
|
AssumeRoleRequest |
withExternalId(String externalId)
A unique identifier that is used by third parties when assuming roles
in their customers' accounts.
|
AssumeRoleRequest |
withPolicy(String policy)
An IAM policy in JSON format.
|
AssumeRoleRequest |
withRoleArn(String roleArn)
The Amazon Resource Name (ARN) of the role to assume.
|
AssumeRoleRequest |
withRoleSessionName(String roleSessionName)
An identifier for the assumed role session.
|
AssumeRoleRequest |
withSerialNumber(String serialNumber)
The identification number of the MFA device that is associated with
the user who is making the
AssumeRole call. |
AssumeRoleRequest |
withTokenCode(String tokenCode)
The value provided by the MFA device, if the trust policy of the role
being assumed requires MFA (that is, if the policy includes a
condition that tests for MFA).
|
copyBaseTo, getCustomQueryParameters, getCustomRequestHeaders, getGeneralProgressListener, getReadLimit, getRequestClientOptions, getRequestCredentials, getRequestMetricCollector, putCustomQueryParameter, putCustomRequestHeader, setGeneralProgressListener, setRequestCredentials, setRequestMetricCollector, withGeneralProgressListener, withRequestMetricCollector
public String getRoleArn()
Constraints:
Length: 20 - 2048
public void setRoleArn(String roleArn)
Constraints:
Length: 20 - 2048
roleArn
- The Amazon Resource Name (ARN) of the role to assume.public AssumeRoleRequest withRoleArn(String roleArn)
Returns a reference to this object so that method calls can be chained together.
Constraints:
Length: 20 - 2048
roleArn
- The Amazon Resource Name (ARN) of the role to assume.public String getRoleSessionName()
Use the role session name to uniquely identity a session when the same role is assumed by different principals or for different reasons. In cross-account scenarios, the role session name is visible to, and can be logged by the account that owns the role. The role session name is also used in the ARN of the assumed role principal. This means that subsequent cross-account API requests using the temporary security credentials will expose the role session name to the external account in their CloudTrail logs.
Constraints:
Length: 2 - 32
Pattern: [\w+=,.@-]*
Use the role session name to uniquely identity a session when the same role is assumed by different principals or for different reasons. In cross-account scenarios, the role session name is visible to, and can be logged by the account that owns the role. The role session name is also used in the ARN of the assumed role principal. This means that subsequent cross-account API requests using the temporary security credentials will expose the role session name to the external account in their CloudTrail logs.
public void setRoleSessionName(String roleSessionName)
Use the role session name to uniquely identity a session when the same role is assumed by different principals or for different reasons. In cross-account scenarios, the role session name is visible to, and can be logged by the account that owns the role. The role session name is also used in the ARN of the assumed role principal. This means that subsequent cross-account API requests using the temporary security credentials will expose the role session name to the external account in their CloudTrail logs.
Constraints:
Length: 2 - 32
Pattern: [\w+=,.@-]*
roleSessionName
- An identifier for the assumed role session. Use the role session name to uniquely identity a session when the same role is assumed by different principals or for different reasons. In cross-account scenarios, the role session name is visible to, and can be logged by the account that owns the role. The role session name is also used in the ARN of the assumed role principal. This means that subsequent cross-account API requests using the temporary security credentials will expose the role session name to the external account in their CloudTrail logs.
public AssumeRoleRequest withRoleSessionName(String roleSessionName)
Use the role session name to uniquely identity a session when the same role is assumed by different principals or for different reasons. In cross-account scenarios, the role session name is visible to, and can be logged by the account that owns the role. The role session name is also used in the ARN of the assumed role principal. This means that subsequent cross-account API requests using the temporary security credentials will expose the role session name to the external account in their CloudTrail logs.
Returns a reference to this object so that method calls can be chained together.
Constraints:
Length: 2 - 32
Pattern: [\w+=,.@-]*
roleSessionName
- An identifier for the assumed role session. Use the role session name to uniquely identity a session when the same role is assumed by different principals or for different reasons. In cross-account scenarios, the role session name is visible to, and can be logged by the account that owns the role. The role session name is also used in the ARN of the assumed role principal. This means that subsequent cross-account API requests using the temporary security credentials will expose the role session name to the external account in their CloudTrail logs.
public String getPolicy()
This parameter is optional. If you
pass a policy, the temporary security credentials that are returned by
the operation have the permissions that are allowed by both (the
intersection of) the access policy of the role that is being assumed,
and the policy that you pass. This gives you a way to further
restrict the permissions for the resulting temporary security
credentials. You cannot use the passed policy to grant permissions
that are in excess of those allowed by the access policy of the role
that is being assumed. For more information, see Permissions
for AssumeRole, AssumeRoleWithSAML, and AssumeRoleWithWebIdentity
in Using Temporary Security Credentials.
Constraints:
Length: 1 - 2048
Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
This parameter is optional. If you
pass a policy, the temporary security credentials that are returned by
the operation have the permissions that are allowed by both (the
intersection of) the access policy of the role that is being assumed,
and the policy that you pass. This gives you a way to further
restrict the permissions for the resulting temporary security
credentials. You cannot use the passed policy to grant permissions
that are in excess of those allowed by the access policy of the role
that is being assumed. For more information, see Permissions
for AssumeRole, AssumeRoleWithSAML, and AssumeRoleWithWebIdentity
in Using Temporary Security Credentials.
public void setPolicy(String policy)
This parameter is optional. If you
pass a policy, the temporary security credentials that are returned by
the operation have the permissions that are allowed by both (the
intersection of) the access policy of the role that is being assumed,
and the policy that you pass. This gives you a way to further
restrict the permissions for the resulting temporary security
credentials. You cannot use the passed policy to grant permissions
that are in excess of those allowed by the access policy of the role
that is being assumed. For more information, see Permissions
for AssumeRole, AssumeRoleWithSAML, and AssumeRoleWithWebIdentity
in Using Temporary Security Credentials.
Constraints:
Length: 1 - 2048
Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
policy
- An IAM policy in JSON format. This parameter is optional. If you
pass a policy, the temporary security credentials that are returned by
the operation have the permissions that are allowed by both (the
intersection of) the access policy of the role that is being assumed,
and the policy that you pass. This gives you a way to further
restrict the permissions for the resulting temporary security
credentials. You cannot use the passed policy to grant permissions
that are in excess of those allowed by the access policy of the role
that is being assumed. For more information, see Permissions
for AssumeRole, AssumeRoleWithSAML, and AssumeRoleWithWebIdentity
in Using Temporary Security Credentials.
public AssumeRoleRequest withPolicy(String policy)
This parameter is optional. If you
pass a policy, the temporary security credentials that are returned by
the operation have the permissions that are allowed by both (the
intersection of) the access policy of the role that is being assumed,
and the policy that you pass. This gives you a way to further
restrict the permissions for the resulting temporary security
credentials. You cannot use the passed policy to grant permissions
that are in excess of those allowed by the access policy of the role
that is being assumed. For more information, see Permissions
for AssumeRole, AssumeRoleWithSAML, and AssumeRoleWithWebIdentity
in Using Temporary Security Credentials.
Returns a reference to this object so that method calls can be chained together.
Constraints:
Length: 1 - 2048
Pattern: [\u0009\u000A\u000D\u0020-\u00FF]+
policy
- An IAM policy in JSON format. This parameter is optional. If you
pass a policy, the temporary security credentials that are returned by
the operation have the permissions that are allowed by both (the
intersection of) the access policy of the role that is being assumed,
and the policy that you pass. This gives you a way to further
restrict the permissions for the resulting temporary security
credentials. You cannot use the passed policy to grant permissions
that are in excess of those allowed by the access policy of the role
that is being assumed. For more information, see Permissions
for AssumeRole, AssumeRoleWithSAML, and AssumeRoleWithWebIdentity
in Using Temporary Security Credentials.
public Integer getDurationSeconds()
Constraints:
Range: 900 - 3600
public void setDurationSeconds(Integer durationSeconds)
Constraints:
Range: 900 - 3600
durationSeconds
- The duration, in seconds, of the role session. The value can range
from 900 seconds (15 minutes) to 3600 seconds (1 hour). By default,
the value is set to 3600 seconds.public AssumeRoleRequest withDurationSeconds(Integer durationSeconds)
Returns a reference to this object so that method calls can be chained together.
Constraints:
Range: 900 - 3600
durationSeconds
- The duration, in seconds, of the role session. The value can range
from 900 seconds (15 minutes) to 3600 seconds (1 hour). By default,
the value is set to 3600 seconds.public String getExternalId()
Constraints:
Length: 2 - 96
Pattern: [\w+=,.@:-]*
public void setExternalId(String externalId)
Constraints:
Length: 2 - 96
Pattern: [\w+=,.@:-]*
externalId
- A unique identifier that is used by third parties when assuming roles
in their customers' accounts. For each role that the third party can
assume, they should instruct their customers to ensure the role's
trust policy checks for the external ID that the third party
generated. Each time the third party assumes the role, they should
pass the customer's external ID. The external ID is useful in order to
help third parties bind a role to the customer who created it. For
more information about the external ID, see How
to Use External ID When Granting Access to Your AWS Resources in
Using Temporary Security Credentials.public AssumeRoleRequest withExternalId(String externalId)
Returns a reference to this object so that method calls can be chained together.
Constraints:
Length: 2 - 96
Pattern: [\w+=,.@:-]*
externalId
- A unique identifier that is used by third parties when assuming roles
in their customers' accounts. For each role that the third party can
assume, they should instruct their customers to ensure the role's
trust policy checks for the external ID that the third party
generated. Each time the third party assumes the role, they should
pass the customer's external ID. The external ID is useful in order to
help third parties bind a role to the customer who created it. For
more information about the external ID, see How
to Use External ID When Granting Access to Your AWS Resources in
Using Temporary Security Credentials.public String getSerialNumber()
AssumeRole
call. Specify this
value if the trust policy of the role being assumed includes a
condition that requires MFA authentication. The value is either the
serial number for a hardware device (such as
GAHT12345678
) or an Amazon Resource Name (ARN) for a
virtual device (such as
arn:aws:iam::123456789012:mfa/user
).
Constraints:
Length: 9 - 256
Pattern: [\w+=/:,.@-]*
AssumeRole
call. Specify this
value if the trust policy of the role being assumed includes a
condition that requires MFA authentication. The value is either the
serial number for a hardware device (such as
GAHT12345678
) or an Amazon Resource Name (ARN) for a
virtual device (such as
arn:aws:iam::123456789012:mfa/user
).public void setSerialNumber(String serialNumber)
AssumeRole
call. Specify this
value if the trust policy of the role being assumed includes a
condition that requires MFA authentication. The value is either the
serial number for a hardware device (such as
GAHT12345678
) or an Amazon Resource Name (ARN) for a
virtual device (such as
arn:aws:iam::123456789012:mfa/user
).
Constraints:
Length: 9 - 256
Pattern: [\w+=/:,.@-]*
serialNumber
- The identification number of the MFA device that is associated with
the user who is making the AssumeRole
call. Specify this
value if the trust policy of the role being assumed includes a
condition that requires MFA authentication. The value is either the
serial number for a hardware device (such as
GAHT12345678
) or an Amazon Resource Name (ARN) for a
virtual device (such as
arn:aws:iam::123456789012:mfa/user
).public AssumeRoleRequest withSerialNumber(String serialNumber)
AssumeRole
call. Specify this
value if the trust policy of the role being assumed includes a
condition that requires MFA authentication. The value is either the
serial number for a hardware device (such as
GAHT12345678
) or an Amazon Resource Name (ARN) for a
virtual device (such as
arn:aws:iam::123456789012:mfa/user
).
Returns a reference to this object so that method calls can be chained together.
Constraints:
Length: 9 - 256
Pattern: [\w+=/:,.@-]*
serialNumber
- The identification number of the MFA device that is associated with
the user who is making the AssumeRole
call. Specify this
value if the trust policy of the role being assumed includes a
condition that requires MFA authentication. The value is either the
serial number for a hardware device (such as
GAHT12345678
) or an Amazon Resource Name (ARN) for a
virtual device (such as
arn:aws:iam::123456789012:mfa/user
).public String getTokenCode()
TokenCode
value is missing or expired, the
AssumeRole
call returns an "access denied" error.
Constraints:
Length: 6 - 6
Pattern: [\d]*
TokenCode
value is missing or expired, the
AssumeRole
call returns an "access denied" error.public void setTokenCode(String tokenCode)
TokenCode
value is missing or expired, the
AssumeRole
call returns an "access denied" error.
Constraints:
Length: 6 - 6
Pattern: [\d]*
tokenCode
- The value provided by the MFA device, if the trust policy of the role
being assumed requires MFA (that is, if the policy includes a
condition that tests for MFA). If the role being assumed requires MFA
and if the TokenCode
value is missing or expired, the
AssumeRole
call returns an "access denied" error.public AssumeRoleRequest withTokenCode(String tokenCode)
TokenCode
value is missing or expired, the
AssumeRole
call returns an "access denied" error.
Returns a reference to this object so that method calls can be chained together.
Constraints:
Length: 6 - 6
Pattern: [\d]*
tokenCode
- The value provided by the MFA device, if the trust policy of the role
being assumed requires MFA (that is, if the policy includes a
condition that tests for MFA). If the role being assumed requires MFA
and if the TokenCode
value is missing or expired, the
AssumeRole
call returns an "access denied" error.public String toString()
toString
in class Object
Object.toString()
public AssumeRoleRequest clone()
AmazonWebServiceRequest
clone
in class AmazonWebServiceRequest
Object.clone()
Copyright © 2015. All rights reserved.