Learn R Programming

paws.security.identity (version 0.7.0)

iamrolesanywhere: IAM Roles Anywhere

Description

Identity and Access Management Roles Anywhere provides a secure way for your workloads such as servers, containers, and applications that run outside of Amazon Web Services to obtain temporary Amazon Web Services credentials. Your workloads can use the same IAM policies and roles you have for native Amazon Web Services applications to access Amazon Web Services resources. Using IAM Roles Anywhere eliminates the need to manage long-term credentials for workloads running outside of Amazon Web Services.

To use IAM Roles Anywhere, your workloads must use X.509 certificates issued by their certificate authority (CA). You register the CA with IAM Roles Anywhere as a trust anchor to establish trust between your public key infrastructure (PKI) and IAM Roles Anywhere. If you don't manage your own PKI system, you can use Private Certificate Authority to create a CA and then use that to establish trust with IAM Roles Anywhere.

This guide describes the IAM Roles Anywhere operations that you can call programmatically. For more information about IAM Roles Anywhere, see the IAM Roles Anywhere User Guide.

Usage

iamrolesanywhere(
  config = list(),
  credentials = list(),
  endpoint = NULL,
  region = NULL
)

Value

A client for the service. You can call the service's operations using syntax like svc$operation(...), where svc is the name you've assigned to the client. The available operations are listed in the Operations section.

Arguments

config

Optional configuration of credentials, endpoint, and/or region.

  • credentials:

    • creds:

      • access_key_id: AWS access key ID

      • secret_access_key: AWS secret access key

      • session_token: AWS temporary session token

    • profile: The name of a profile to use. If not given, then the default profile is used.

    • anonymous: Set anonymous credentials.

  • endpoint: The complete URL to use for the constructed client.

  • region: The AWS Region used in instantiating the client.

  • close_connection: Immediately close all HTTP connections.

  • timeout: The time in seconds till a timeout exception is thrown when attempting to make a connection. The default is 60 seconds.

  • s3_force_path_style: Set this to true to force the request to use path-style addressing, i.e. http://s3.amazonaws.com/BUCKET/KEY.

  • sts_regional_endpoint: Set sts regional endpoint resolver to regional or legacy https://docs.aws.amazon.com/sdkref/latest/guide/feature-sts-regionalized-endpoints.html

credentials

Optional credentials shorthand for the config parameter

  • creds:

    • access_key_id: AWS access key ID

    • secret_access_key: AWS secret access key

    • session_token: AWS temporary session token

  • profile: The name of a profile to use. If not given, then the default profile is used.

  • anonymous: Set anonymous credentials.

endpoint

Optional shorthand for complete URL to use for the constructed client.

region

Optional shorthand for AWS Region used in instantiating the client.

Service syntax

svc <- iamrolesanywhere(
  config = list(
    credentials = list(
      creds = list(
        access_key_id = "string",
        secret_access_key = "string",
        session_token = "string"
      ),
      profile = "string",
      anonymous = "logical"
    ),
    endpoint = "string",
    region = "string",
    close_connection = "logical",
    timeout = "numeric",
    s3_force_path_style = "logical",
    sts_regional_endpoint = "string"
  ),
  credentials = list(
    creds = list(
      access_key_id = "string",
      secret_access_key = "string",
      session_token = "string"
    ),
    profile = "string",
    anonymous = "logical"
  ),
  endpoint = "string",
  region = "string"
)

Operations

create_profileCreates a profile, a list of the roles that Roles Anywhere service is trusted to assume
create_trust_anchorCreates a trust anchor to establish trust between IAM Roles Anywhere and your certificate authority (CA)
delete_attribute_mappingDelete an entry from the attribute mapping rules enforced by a given profile
delete_crlDeletes a certificate revocation list (CRL)
delete_profileDeletes a profile
delete_trust_anchorDeletes a trust anchor
disable_crlDisables a certificate revocation list (CRL)
disable_profileDisables a profile
disable_trust_anchorDisables a trust anchor
enable_crlEnables a certificate revocation list (CRL)
enable_profileEnables temporary credential requests for a profile
enable_trust_anchorEnables a trust anchor
get_crlGets a certificate revocation list (CRL)
get_profileGets a profile
get_subjectGets a subject, which associates a certificate identity with authentication attempts
get_trust_anchorGets a trust anchor
import_crlImports the certificate revocation list (CRL)
list_crlsLists all certificate revocation lists (CRL) in the authenticated account and Amazon Web Services Region
list_profilesLists all profiles in the authenticated account and Amazon Web Services Region
list_subjectsLists the subjects in the authenticated account and Amazon Web Services Region
list_tags_for_resourceLists the tags attached to the resource
list_trust_anchorsLists the trust anchors in the authenticated account and Amazon Web Services Region
put_attribute_mappingPut an entry in the attribute mapping rules that will be enforced by a given profile
put_notification_settingsAttaches a list of notification settings to a trust anchor
reset_notification_settingsResets the custom notification setting to IAM Roles Anywhere default setting
tag_resourceAttaches tags to a resource
untag_resourceRemoves tags from the resource
update_crlUpdates the certificate revocation list (CRL)
update_profileUpdates a profile, a list of the roles that IAM Roles Anywhere service is trusted to assume
update_trust_anchorUpdates a trust anchor

Examples

Run this code
if (FALSE) {
svc <- iamrolesanywhere()
svc$create_profile(
  Foo = 123
)
}

Run the code above in your browser using DataLab