SAML.to
  • Introduction
  • Installation
  • Configuration
    • Identity Providers
      • GitHub
    • Service Providers
      • AWS (Federated Roles)
        • Assuming Roles
          • AWS CLI
          • AWS SDKs
          • Docker
          • Terraform
          • Kubernetes
        • Adding Users
        • Adding AWS Accounts
        • Adding Roles
        • Roles for GitHub Actions
    • Configuration Reference
      • Substitutions
  • FAQs
  • Usage
    • CLI
      • login
      • assume
      • list-roles
    • GitHub Actions
      • Assume AWS Role Action
      • Config Sync Action
  • Advanced Usage
    • AWS
      • CloudWatch Dashboard Sharing
Powered by GitBook
On this page
  1. Usage
  2. GitHub Actions

Assume AWS Role Action

https://github.com/marketplace/actions/saml-to-assume-aws-role

PreviousGitHub ActionsNextConfig Sync Action

Last updated 2 years ago

The Assume AWS Role action is the GitHub action that can be used in various repositories to assume a role with configured with SAML.to.

See the on GitHub for more information!

Assuming you have already , the Assume AWS Role Action can be used in GitHub Actions. For example:

   jobs:
     prerelease:
       runs-on: ubuntu-latest
       steps:
         - uses: saml-to/assume-aws-role-action@v1
           env:
             GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
           with:
             role: "THE_DESIRED_ROLE_ARN"
         - run: aws ec2 describe-instances
Assume AWS Role Action
Installed SAML.to