You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description of the problem being solved
I want to assume role in our AWS account like GitHub Actions.
If it is possible, we can use some AWS resource from Slack Workflow.
Alternative solutions
Now we can use some resource from AWS with IAM user credentials. But IAM User isn't match AWS's best practice and AWS recommends to use temporary credentials by AssumeRoleWithWebIdentity.
Also, if each Slack application were given its own individual instance profile (assuming that they run on AWS infrastructure, which should be the case since Salesforce is all AWS), it would make it very easy to allow it to assume a role in our AWS account (we would just have to enable that instance profile ARN to assume the desired role).
Description of the problem being solved
I want to assume role in our AWS account like GitHub Actions.
If it is possible, we can use some AWS resource from Slack Workflow.
Alternative solutions
Now we can use some resource from AWS with IAM user credentials. But IAM User isn't match AWS's best practice and AWS recommends to use temporary credentials by
AssumeRoleWithWebIdentity
.Requirements
Please read the Contributing guidelines and Code of Conduct before creating this issue or pull request. By submitting, you are agreeing to those rules.
The text was updated successfully, but these errors were encountered: