Switch to an IAM role (AWS CLI)
A role specifies a set of permissions that you can use to access AWS resources that you need. In that sense, it is similar to a user in AWS Identity and Access Management (IAM). When you sign in as a user, you get a specific set of permissions. However, you don't sign in to a role, but after signing in as a user, you can switch to a role. This temporarily sets aside your original user permissions and instead gives you the permissions assigned to the role. The role can be in your own account or any other AWS account. For more information about roles, their benefits, and how to create and configure them, see IAM roles, and IAM role creation. To learn about the different methods that you can use to assume a role, see Methods to assume a role.
Important
The permissions of your IAM user and any roles that you assume are not cumulative. Only one set of permissions is active at a time. When you assume a role, you temporarily give up your previous user or role permissions and work with the permissions that are assigned to the role. When you exit the role, your user permissions are automatically restored.
You can use a role to run an AWS CLI command when you are signed in as an IAM user. You can also use a role to run an AWS CLI command when you are signed in as an externally authenticated user (SAML or OIDC) that is already using a role. In addition, you can use a role to run an AWS CLI command from within an Amazon EC2 instance that is attached to a role through its instance profile. You cannot assume a role when you are signed in as the AWS account root user.
Role chaining – You can also use role chaining, which is using permissions from a role to access a second role.
By default, your role session lasts for one hour. When you assume this role using the
assume-role* CLI operations, you can specify a value for the
duration-seconds parameter. This value can range from 900 seconds (15 minutes)
up to the maximum session duration setting for the role. If you switch roles in the console,
your session duration is limited to maximum of one hour. To learn how to view the maximum
value for your role, see Update the maximum session duration
for a role.
If you use role chaining, your session duration is limited to a maximum of one hour. If you
then use the duration-seconds parameter to provide a value greater than one hour,
the operation fails.
Example scenario: Switch to a production role
Imagine that you are an IAM user for working in the development environment. In this
scenario, you occasionally need to work with the production environment at the command line
with the AWS CLI
Note
For security purposes, administrators can review AWS CloudTrail logs to learn who performed an action in AWS. Your administrator might require that you specify a source identity or a role session name when you assume the role. For more information, see sts:SourceIdentity and sts:RoleSessionName.
To switch to a production role (AWS CLI)
-
If you have never used the AWS CLI, then you must first configure your default CLI profile. Open a command prompt and set up your AWS CLI installation to use the access key from your IAM user or from your federated role. For more information, see Configuring the AWS Command Line Interface in the AWS Command Line Interface User Guide.
Run the aws configure command as follows:
aws configureWhen prompted, provide the following information:
AWS Access Key ID [None]:AWS Secret Access Key [None]:AKIAIOSFODNN7EXAMPLEDefault region name [None]:wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEYDefault output format [None]:us-east-2json -
Create a new profile for the role in the
.aws/configfile in Unix or Linux, or theC:\Users\USERNAME\.aws\configfile in Windows. The following example creates a profile calledprodaccessthat switches to the rolein theProductionAccessRole123456789012account. You get the role ARN from the account administrator who created the role. When this profile is invoked, the AWS CLI uses the credentials of thesource_profileto request credentials for the role. Because of that, the identity referenced as thesource_profilemust havests:AssumeRolepermissions to the role that is specified in therole_arn.[profile prodaccess] role_arn = arn:aws:iam::123456789012:role/ProductionAccessRole source_profile = default -
After you create the new profile, any AWS CLI command that specifies the parameter
--profile prodaccessruns under the permissions that are attached to the IAM roleProductionAccessRoleinstead of the default user.aws iam list-users --profile prodaccessThis command works if the permissions assigned to the
ProductionAccessRoleenable listing the users in the current AWS account. -
To return to the permissions granted by your original credentials, run commands without the
--profileparameter. The AWS CLI reverts to using the credentials in your default profile, which you configured in Step 1.
For more information, see Assuming a Role in the AWS Command Line Interface User Guide.
Example scenario: Allow an instance profile role to switch to a role in another account
Imagine that you are using two AWS accounts, and you want to allow an application
running on an Amazon EC2 instance to run AWS CLI111111111111. That instance includes the abcd
instance profile role that allows the application to perform read-only Amazon S3 tasks on the
amzn-s3-demo-bucket1 bucket within the same
111111111111 account. However, the application must also be
allowed to assume the efgh cross-account role to perform tasks in account
222222222222. To do this, the abcd EC2 instance
profile role must have the following permissions policy:
Account 111111111111
abcd role permissions policy
Assume that the efgh cross-account role allows read-only Amazon S3 tasks on the
amzn-s3-demo-bucket2 bucket within the same
222222222222 account. To do this, the efgh
cross-account role must have the following permissions policy:
Account 222222222222
efgh role permissions policy
The efgh role must allow the abcd instance profile role to
assume it. To do this, the efgh role must have the following trust
policy:
Account 222222222222
efgh role trust policy
To then run AWS CLI commands in account 222222222222, you must
update the CLI configuration file. Identify the efgh role as the "profile" and
the abcd EC2 instance profile role as the "credential source" in the AWS CLI
configuration file. Then your CLI commands are run with the permissions of the
efgh role, not the original abcd role.
Note
For security purposes, you can use AWS CloudTrail to audit the use of roles in the account.
To differentiate between role sessions when a role is used by different principals in
CloudTrail logs, you can use the role session name. When the AWS CLI assumes a role on a user's
behalf as described in this topic, a role session name is automatically created as
AWS-CLI-session-. Here
nnnnnnnnnnnnnnnn is an integer that represents the time in Unix epoch time
To allow an EC2 instance profile role to switch to a cross-account role (AWS CLI)
-
You do not have to configure a default CLI profile. Instead, you can load credentials from the EC2 instance profile metadata. Create a new profile for the role in the
.aws/configfile. The following example creates aninstancecrossaccountprofile that switches to the rolein theefgh222222222222account. When this profile is invoked, the AWS CLI uses the credentials of the EC2 instance profile metadata to request credentials for the role. Because of that, the EC2 instance profile role must havests:AssumeRolepermissions to the role specified in therole_arn.[profile instancecrossaccount] role_arn = arn:aws:iam::222222222222:role/efgh credential_source = Ec2InstanceMetadata -
After you create the new profile, any AWS CLI command that specifies the parameter
--profile instancecrossaccountruns under the permissions that are attached to theefghrole in account222222222222.aws s3 ls amzn-s3-demo-bucket2 --profile instancecrossaccountThis command works if the permissions that are assigned to the
efghrole allow listing the users in the current AWS account. -
To return to the original EC2 instance profile permissions in account
111111111111, run the CLI commands without the--profileparameter.
For more information, see Assuming a Role in the AWS Command Line Interface User Guide.