AWS IAM
Learn how to dynamically generate AWS IAM Users.
The Infisical AWS IAM dynamic secret allows you to generate AWS IAM Users on demand based on configured AWS policy.
Prerequisite
Infisical needs an initial AWS IAM user with the required permissions to create sub IAM users. This IAM user will be responsible for managing the lifecycle of new IAM users.
Set up Dynamic Secrets with AWS IAM
Infisical will assume the provided role in your AWS account securely, without the need to share any credentials.
Create the Managing User IAM Role for Infisical
-
Navigate to the Create IAM Role page in your AWS Console.
-
Select AWS Account as the Trusted Entity Type.
-
Select Another AWS Account and provide the appropriate Infisical AWS Account ID: use 381492033652 for the US region, and 345594589636 for the EU region. This restricts the role to be assumed only by Infisical. If self-hosting, provide your AWS account number instead.
-
(Recommended) Enable “Require external ID” and input your Project ID to strengthen security and mitigate the confused deputy problem.
-
Assign permission as shared in prerequisite.
When configuring an IAM Role that Infisical will assume, it’s highly recommended to enable the “Require external ID” option and specify your Project ID.
This precaution helps protect your AWS account against the confused deputy problem, a potential security vulnerability where Infisical could be tricked into performing actions on your behalf by an unauthorized actor.
Copy the AWS IAM Role ARN
Secret Overview Dashboard
Navigate to the Secret Overview dashboard and select the environment in which you would like to add a dynamic secret to.
Click on the 'Add Dynamic Secret' button
Select AWS IAM
Provide the inputs for dynamic secret parameters
Name by which you want the secret to be referenced
Default time-to-live for a generated secret (it is possible to modify this value after a secret is generated)
Maximum time-to-live for a generated secret
Specifies a template for generating usernames. This field allows customization of how usernames are automatically created.
Allowed template variables are
{{randomUsername}}
: Random username string{{unixTimestamp}}
: Current Unix timestamp{{identity.name}}
: Name of the identity that is generating the secret{{random N}}
: Random string of N characters
Allowed template functions are
truncate
: Truncates a string to a specified lengthreplace
: Replaces a substring with another value
Examples:
Tags to be added to the created IAM User resource.
Select Assume Role method.
The ARN of the AWS Role to assume.
IAM AWS Path to scope created IAM User resource access.
The AWS data center region.
The IAM Policy ARN of the AWS Permissions Boundary to attach to IAM users created in the role.
The AWS IAM groups that should be assigned to the created users. Multiple values can be provided by separating them with commas
The AWS IAM managed policies that should be attached to the created users. Multiple values can be provided by separating them with commas
The AWS IAM inline policy that should be attached to the created users. Multiple values can be provided by separating them with commas
Specifies a template for generating usernames. This field allows customization of how usernames are automatically created.
Allowed template variables are
{{randomUsername}}
: Random username string{{unixTimestamp}}
: Current Unix timestamp
Click 'Submit'
After submitting the form, you will see a dynamic secret created in the dashboard.
Generate dynamic secrets
Once you’ve successfully configured the dynamic secret, you’re ready to generate on-demand credentials. To do this, simply click on the ‘Generate’ button which appears when hovering over the dynamic secret item. Alternatively, you can initiate the creation of a new lease by selecting ‘New Lease’ from the dynamic secret lease list section.
When generating these secrets, it’s important to specify a Time-to-Live (TTL) duration. This will dictate how long the credentials are valid for.
Ensure that the TTL for the lease falls within the maximum TTL defined when configuring the dynamic secret in step 4.
Once you click the Submit
button, a new secret lease will be generated and the credentials for it will be shown to you.
Infisical will assume the provided role in your AWS account securely, without the need to share any credentials.
Create the Managing User IAM Role for Infisical
-
Navigate to the Create IAM Role page in your AWS Console.
-
Select AWS Account as the Trusted Entity Type.
-
Select Another AWS Account and provide the appropriate Infisical AWS Account ID: use 381492033652 for the US region, and 345594589636 for the EU region. This restricts the role to be assumed only by Infisical. If self-hosting, provide your AWS account number instead.
-
(Recommended) Enable “Require external ID” and input your Project ID to strengthen security and mitigate the confused deputy problem.
-
Assign permission as shared in prerequisite.
When configuring an IAM Role that Infisical will assume, it’s highly recommended to enable the “Require external ID” option and specify your Project ID.
This precaution helps protect your AWS account against the confused deputy problem, a potential security vulnerability where Infisical could be tricked into performing actions on your behalf by an unauthorized actor.
Copy the AWS IAM Role ARN
Secret Overview Dashboard
Navigate to the Secret Overview dashboard and select the environment in which you would like to add a dynamic secret to.
Click on the 'Add Dynamic Secret' button
Select AWS IAM
Provide the inputs for dynamic secret parameters
Name by which you want the secret to be referenced
Default time-to-live for a generated secret (it is possible to modify this value after a secret is generated)
Maximum time-to-live for a generated secret
Specifies a template for generating usernames. This field allows customization of how usernames are automatically created.
Allowed template variables are
{{randomUsername}}
: Random username string{{unixTimestamp}}
: Current Unix timestamp{{identity.name}}
: Name of the identity that is generating the secret{{random N}}
: Random string of N characters
Allowed template functions are
truncate
: Truncates a string to a specified lengthreplace
: Replaces a substring with another value
Examples:
Tags to be added to the created IAM User resource.
Select Assume Role method.
The ARN of the AWS Role to assume.
IAM AWS Path to scope created IAM User resource access.
The AWS data center region.
The IAM Policy ARN of the AWS Permissions Boundary to attach to IAM users created in the role.
The AWS IAM groups that should be assigned to the created users. Multiple values can be provided by separating them with commas
The AWS IAM managed policies that should be attached to the created users. Multiple values can be provided by separating them with commas
The AWS IAM inline policy that should be attached to the created users. Multiple values can be provided by separating them with commas
Specifies a template for generating usernames. This field allows customization of how usernames are automatically created.
Allowed template variables are
{{randomUsername}}
: Random username string{{unixTimestamp}}
: Current Unix timestamp
Click 'Submit'
After submitting the form, you will see a dynamic secret created in the dashboard.
Generate dynamic secrets
Once you’ve successfully configured the dynamic secret, you’re ready to generate on-demand credentials. To do this, simply click on the ‘Generate’ button which appears when hovering over the dynamic secret item. Alternatively, you can initiate the creation of a new lease by selecting ‘New Lease’ from the dynamic secret lease list section.
When generating these secrets, it’s important to specify a Time-to-Live (TTL) duration. This will dictate how long the credentials are valid for.
Ensure that the TTL for the lease falls within the maximum TTL defined when configuring the dynamic secret in step 4.
Once you click the Submit
button, a new secret lease will be generated and the credentials for it will be shown to you.
Infisical will use the provided Access Key ID and Secret Key to connect to your AWS instance.
Secret Overview Dashboard
Navigate to the Secret Overview dashboard and select the environment in which you would like to add a dynamic secret to.
Click on the 'Add Dynamic Secret' button
Select AWS IAM
Provide the inputs for dynamic secret parameters
Name by which you want the secret to be referenced
Default time-to-live for a generated secret (it is possible to modify this value after a secret is generated)
Maximum time-to-live for a generated secret
Select Access Key method.
The managing AWS IAM User Access Key
The managing AWS IAM User Secret Key
IAM AWS Path to scope created IAM User resource access.
The AWS data center region.
The IAM Policy ARN of the AWS Permissions Boundary to attach to IAM users created in the role.
The AWS IAM groups that should be assigned to the created users. Multiple values can be provided by separating them with commas
The AWS IAM managed policies that should be attached to the created users. Multiple values can be provided by separating them with commas
The AWS IAM inline policy that should be attached to the created users. Multiple values can be provided by separating them with commas
Specifies a template for generating usernames. This field allows customization of how usernames are automatically created.
Allowed template variables are
{{randomUsername}}
: Random username string{{unixTimestamp}}
: Current Unix timestamp
Tags to be added to the created IAM User resource.
Click 'Submit'
After submitting the form, you will see a dynamic secret created in the dashboard.
Generate dynamic secrets
Once you’ve successfully configured the dynamic secret, you’re ready to generate on-demand credentials. To do this, simply click on the ‘Generate’ button which appears when hovering over the dynamic secret item. Alternatively, you can initiate the creation of a new lease by selecting ‘New Lease’ from the dynamic secret lease list section.
When generating these secrets, it’s important to specify a Time-to-Live (TTL) duration. This will dictate how long the credentials are valid for.
Ensure that the TTL for the lease falls within the maximum TTL defined when configuring the dynamic secret in step 4.
Once you click the Submit
button, a new secret lease will be generated and the credentials for it will be shown to you.
Audit or Revoke Leases
Once you have created one or more leases, you will be able to access them by clicking on the respective dynamic secret item on the dashboard. This will allow you to see the lease details and delete the lease ahead of its expiration time.
Renew Leases
To extend the life of the generated dynamic secret lease past its initial time to live, simply click on the Renew button as illustrated below.
Lease renewals cannot exceed the maximum TTL set when configuring the dynamic secret