SAML.to
  • Introduction
  • Installation
  • Configuration
    • Identity Providers
      • GitHub
    • Service Providers
      • AWS (Federated Roles)
        • Assuming Roles
          • AWS CLI
          • AWS SDKs
          • Docker
          • Terraform
          • Kubernetes
        • Adding Users
        • Adding AWS Accounts
        • Adding Roles
        • Roles for GitHub Actions
    • Configuration Reference
      • Substitutions
  • FAQs
  • Usage
    • CLI
      • login
      • assume
      • list-roles
    • GitHub Actions
      • Assume AWS Role Action
      • Config Sync Action
  • Advanced Usage
    • AWS
      • CloudWatch Dashboard Sharing
Powered by GitBook
On this page
  1. Configuration
  2. Service Providers
  3. AWS (Federated Roles)

Roles for GitHub Actions

PreviousAdding RolesNextConfiguration Reference

Last updated 2 years ago

AWS Roles can be assumed in GitHub Actions by completing two steps:

  1. Edit the saml-to.yml to include the name of the repository that needs access to a given role

    1. : Access granted access to some-repo access to stark-international-administrator

    2. : Access granted to another-repo and within another-org

  2. Add or modify the GitHub action for the repository:

    1. : A GitHub Workflow to assume stark-international-administrator

See for more details.

Example 1
Example 2
Example 1
assume-aws-role-action