We're using Auth0 to give (federated) users access to Auth0 (we've followed these instructions for setup: https://auth0.com/docs/integrations/aws#sso-with-the-aws-dashboard)
In Auth0 we've setup a simple rule system where the federated user's group membership maps to one of two different IAM roles, which gives the user either full access or read-only access (or no access at all) in the aws console.
However, I'm struggling to see how I can provide federated users with the means to get an access key id/secret linked to their account. Our wishlist is:
- The access key id/secret is unique per federated user, and as such is void if the federated user is deleted from the identity provider.
- I could manually provision a IAM role per federated user and link each user to his/her "personal" IAM role, but I'd obviously prefer not to.
All in all I guess I'd like there to be a "linked" IAM user representing each federated account.
So I guess my question is: How do allow my federated users access to personal access key id's in aws?
Federated users require temporary access keys which you can grant with
aws sts assume-role
.