-
Notifications
You must be signed in to change notification settings - Fork 545
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pod Impersonation for IAM #1439
Comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Is your feature request related to a problem? Please describe.
Currently, IAM role permissions must be assigned to the CSI driver itself rather than the pods that mount the volumes, leaving permissions of preventing which pods can mount these volumes as an exercise to the cluster administrator.
Describe the solution you'd like in detail
AWS EFS CSI Driver can impersonate the pod service account identity and exchange that identity for an IAM role that is used for mounting, instead of the CSI driver's native IAM identity.
Describe alternatives you've considered
n/a
Additional context
#885 seems to describe a similar feature, but was closed by automation
The text was updated successfully, but these errors were encountered: