We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
If the IDP provides session tags they should be part of the session's temporary credentials.
Details on how it works are available on https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_adding-assume-role-idp
This feature request is for the nested claim format (if there is a use case another feature could be created for the flattened claim format)
Example claims from the AWS documentation
{ "sub": "johndoe", "aud": "ac_oic_client", "jti": "ZYUCeRMQVtqHypVPWAN3VB", "iss": "https://xyz.com", "iat": 1566583294, "exp": 1566583354, "auth_time": 1566583292, "https://aws.amazon.com/tags": { "principal_tags": { "Project": ["Automation"], "CostCenter": ["987654"], "Department": ["Engineering"] }, "transitive_tag_keys": [ "Project", "CostCenter" ] } }
The text was updated successfully, but these errors were encountered:
feature: implement the Deny effect for policies
9a1fe97
feature: process nested tag claims Allow IDPs to provide sessiont tags via the nested format. This is for VITObelgium#4
pvbouwel
No branches or pull requests
If the IDP provides session tags they should be part of the session's temporary credentials.
Details on how it works are available on https://docs.aws.amazon.com/IAM/latest/UserGuide/id_session-tags.html#id_session-tags_adding-assume-role-idp
This feature request is for the nested claim format (if there is a use case another feature could be created for the flattened claim format)
Example claims from the AWS documentation
The text was updated successfully, but these errors were encountered: