Skip to content

Instantly share code, notes, and snippets.

@jbasney
jbasney / cilogon-aws-sts.md
Last active February 27, 2019 01:41
How to configure an AWS Role to accept CILogon ID Tokens

How to configure an AWS Role to accept CILogon ID Tokens

If your application uses CILogon for authentication, then you can implement role-based access to AWS resources using CILogon identities.

Note the the instructions below use an inactive AWS Role for illustrative purposes.

  1. Register your CILogon client at https://cilogon.org/oauth2/register. Enter a Refresh Token Lifetime (e.g., 43200 seconds) to enable refresh tokens.
  2. Wait for help@cilogon.org to notify you that your client is approved.
  3. Ask help@cilogon.org to update your client_id to conform to AWS naming requirements
  • "Audience can contain only alphanumeric characters and period (.), underscore (_), hyphen (-), and slash (/). Audience cannot be longer than 255 characters. Maximum 255 characters. Use alphanumeric and '._-/' characters."
Verifying that +jbasney is my blockchain ID. https://onename.com/jbasney

Keybase proof

I hereby claim:

  • I am jbasney on github.
  • I am jbasney (https://keybase.io/jbasney) on keybase.
  • I have a public key whose fingerprint is F867 03EA 84ED 456A 7D3E 388E 04DA 0074 775D 6316

To claim this, I am signing this object: