<p dir="ltr">At the moment I don't believe we do. We just use your access key and secret key to identify you to EC2 when we make requests. We don't support using temporary credentials via Assume role<br>
For those of us wanting to know more here is AWS page<br>
<a href="http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user_externalid.html">http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user_externalid.html</a></p>
<p dir="ltr">The big internal technical limitation is that AssumeRole based access needs to be refreshed periodically (the temporary keys are good for at most 1 hour).</p>
<p dir="ltr">John<br>
=:-></p>
<div class="gmail_quote">On Mar 3, 2016 10:46 PM, "Paul Eipper" <<a href="mailto:lkraider@gmail.com">lkraider@gmail.com</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hello,<br>
<br>
Does Juju work with AWS Cross Account Roles? Specifically, IAM users<br>
that need to set the "External ID" string to assume the role?<br>
<br>
AWS Cli support is enabled by configuring a profile:<br>
<a href="https://docs.aws.amazon.com/cli/latest/userguide/cli-roles.html#cli-roles-xaccount" rel="noreferrer" target="_blank">https://docs.aws.amazon.com/cli/latest/userguide/cli-roles.html#cli-roles-xaccount</a><br>
<br>
and then specifying it on the command line:<br>
```<br>
aws s3 ls --profile marketingadmin<br>
```<br>
<br>
Is something like that supported in the Juju EC2 environment config?<br>
<br>
att,<br>
--<br>
Paul Eipper<br>
<br>
--<br>
Juju mailing list<br>
<a href="mailto:Juju@lists.ubuntu.com">Juju@lists.ubuntu.com</a><br>
Modify settings or unsubscribe at: <a href="https://lists.ubuntu.com/mailman/listinfo/juju" rel="noreferrer" target="_blank">https://lists.ubuntu.com/mailman/listinfo/juju</a><br>
</blockquote></div>