mirror of
https://github.com/cloudpanel-io/cloudpanel-ce.git
synced 2026-04-05 20:31:58 +02:00
AWS - Add support for IAM Instance roles #570
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @yannickvr on 8/27/2020
Currently CloudPanel requires an AWS user to be created and access keys are used to allow CloudPanel access to the AWS account. This option should only be considered when the CloudPanel instance is running outside AWS. I'd like to see:
Use IAM Instance role ( https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html ). This way the instance will generate access keys on demand and stolen access keys cannot be used from any other place than the instance itself.
Additionally, using Access Keys or IAM instance role with the option to assume a role in another account should be available as well. This way the CloudPanel instance can be hosted in a separate AWS account outside the regular attack vectors.