Roles Anywhere explanation

This commit is contained in:
JaimePolop
2025-09-29 22:53:29 +02:00
parent f539a9e2d9
commit d11f3a3880

View File

@@ -135,6 +135,11 @@ aws_signing_helper credential-process \
--role-arn arn:aws:iam::123456789012:role/Admin
```
The trust anchor validates that the client certificate `readonly.pem` comes from its authorized CA, when the trust anchor was created the CAs public certificate was included (and now used to validate `readonly.pem`). Inside `readonly.pem` is the public key, which AWS uses to verify that the signature was made with its corresponding private key `readonly.key`.
The certificate also proves identity and provides attributes (such as CN or OU) that the `default` profile transforms into tags, which the roles trust policy can use to decide whether to authorize access, if there are no conditions in the trust policy, those tags are ignored and anyone with a valid certificate is allowed through.
For this attack to be possible, both the trust anchor and the default profile must be active.
### References