AWS Discovery must be able to do an assume role if required

Idea ID 1682618

AWS Discovery must be able to do an assume role if required

Hi,

For securrity reason, in our AWS cloud it is mandatory to do an assume role to be able to discover our VPC

uCMDB must be able to call the assumeRole API if needed.

Best regards,

Thomas

3 Comments
Micro Focus Expert
Micro Focus Expert
Status changed to: Waiting for Votes

The idea has received an initial review to ensure adherence to our idea submission and community guidelines. More information may be needed at this stage and we expect the community to help prioritize the idea with comments and voting

Member.

The same for us, without invoking the assume-role STS API, the standard integration fails with errors 403 unauthorized

Micro Focus Expert
Micro Focus Expert
Status changed to: Delivered

This idea has been implemented in product release CP2019.05. Check out the release notes for details. Thanks to all of our contributors for helping us continue to improve our products!

We added the following new authentication types in AWS Protocol: AWS ServiceAssumeRole, and AssumeRoleWithSAML to expand and simplify the methods of capturing all your AWS data within the constraints set by your security department.

The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.