-
-
Notifications
You must be signed in to change notification settings - Fork 740
Closed
Description
I was frustrated to find that there's not a way to achieve this type of trust policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "",
"Effect": "Allow",
"Principal": {
"Service": "lambda.amazonaws.com"
},
"Action": "sts:AssumeRole"
},
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::ACCOUNT_NUM:root"
},
"Action": "sts:AssumeRole",
"Condition": {
"StringEquals": {
"sts:ExternalId": "SomeExternalId"
}
}
}
]
}
We can already add additional principals as trusted entities to the assume_role policy document. It would be great if we could also add additional statement blocks to the assume_role policy doc.
Metadata
Metadata
Assignees
Labels
No labels