How does AWS IAM role, STS and Identity Pool work with each other -- AWS IAM in a layman's terms (4)
We talked about IAM in the past 3 posts, identities in IAM, manage users privilege as an IT person and control privilege boundaries:
these are IAM topics that are probably trivial to security professionals, but we hope we gave enough ideas to a small startup which does not have full time security professionals yet.
We also talked about how applications use AWS Cognito Identity Pool to get AWS temporary credentials to access AWS resources in early posts of “What I wish I could have learned before starting using AWS Cognito” and “Authentication and authorization with AWS Amplify under the hood”:
application engineers likely have already used the capability provided by Cognito Identity Pool (CIP), but we did not touch deep enough relationship between CIP, STS and IAM role.
In this post, we want to give a holistic view across these three AWS building blocks: CIP, STS and IAM roles.
How does an app access AWS resources by getting credentials from Cognito Identity Pool?
When an application uses Cognito as its AuthN and AuthZ infrastructure, see the post of “What I wish I could have learned before starting using AWS Cognito”, from 10,000 feet high,
the application gets OIDC token from an Cognito User Pool (other IDP authentication mechanism can also work at this step)
then applications get AWS temporary credential from Cognito Identity Pool by providing the IDP-issued tokens (retrieved from the previous step);
then the application can access the AWS resources with the AWS temporary credentials.
This three steps procedure diagram is what we typically see on Internet when people talk about application development using Cognito as auth mechanism (see the next diagram)
How does Identity Pool work with AWS STS?
Let’s zoom in the 2nd step in the previous procedure diagram a bit more. How does Identity Pool issue the AWS temporary credentials? Under the hood, it calls AssumeRole
with the web identity (previously retrieved tokens from IdP) to AWS STS to get the AWS temporary credentials.
How does AWS STS issue temporary credentials with the right IAM role?
During our setup of Identity Pool, we have setup the IAM roles for the authenticated users when we configure the Cognito Identity Pool:
And then we setup the right IAM policy for that role:
The above step exactly sets up the IAM roles, which we talked about in our previous post about IAM identities: STS issues the temporary AWS credentials representing the role we defined in the IAM service
Summary:
This post gives a holistic view of a life of application temporary credential issuing chain:
when application needs to get AWS temporary credentials from Cognito Identity Pool
Cognito Identity Pool communicates with AWS STS;
STS issue the temporary credential representing the right role we set up in AWS Identity Role
I feel this post may be the first article talking all these three together, and we hope we give a simple yet clear description about the under the hood mechanism. Please share this if you think it helps people who do full stack development on AWS.