Use AWS CloudTrail record IAM and AWS STS API calls

IAM with AWS CloudTrail and AWS STS integration, which is a service that provides a record of the user or role taken by the IAM operations. All API CloudTrail IAM and AWS STS will call as an event capture, including a call from the console and API calls. If you create a track, you can make CloudTrail event lasts transferred to Amazon S3 bucket. If you do not configure tracking, you can still CloudTrail console  Event history (event history)  view the latest events. You may be used to obtain information about a request for CloudTrail IAM or AWS STS emitted. For example, you can view the request source IP address, user, time and other details issued.

Principal type IAM/STS API CloudTrail user who logs in call accounts User identity CloudTrail role owner account log in Log user identity CloudTrail subsequent API calls in the role of owner
AWS root user account credentials GetSessionToken Root identity Role Owners account with the same account to call Root identity
IAM users GetSessionToken IAM user identities Role Owners account with the same account to call IAM user identities
IAM users GetFederationToken IAM user identities Role Owners account with the same account to call IAM user identities
IAM users AssumeRole IAM user identities Account and client ID (if the user) or AWS service clients Only the role of identity (without user)
External user authentication AssumeRoleWithSAML no SAML user identity Only the role of identity (without user)
External user authentication AssumeRoleWithWebIdentity no OIDC / Web user identity Only the role of identity (without user)

Scrip requested recording mode - When clients request temporary credentials, the principal type determines how CloudTrail record the event. The following table shows how different CloudTrail call record information for each API to generate temporary credentials.

Guess you like

Origin www.cnblogs.com/cloudrivers/p/11620834.html