provider-aws-access.md 1.1 KB

AWS Authentication

Access to AWS providers can be granted in various ways:

  • IRSA: IAM roles for service accounts.
  • Per pod IAM authentication: kiam or kube2iam.
  • Directly provide AWS credentials to the External Secrets Operator pod by using environment variables.

Additionally, before fetching a secret from a store, ESO is able to assume role (as a proxy so to speak). It is advisable to use multiple roles in a multi-tenant environment.

You can limit the range of roles which can be assumed by this particular namespace by using annotations on the namespace resource. The annotation value is evaluated as a regular expression.

!!! bug "Not implemented"

This is currently **not** implemented. Feel free to contribute.
kind: Namespace
metadata:
  name: iam-example
  annotations:
    # annotation key is configurable
    iam.amazonaws.com/permitted: "arn:aws:iam::123456789012:role/foo.*"