Returns a set of temporary security credentials (consisting of an access key ID, a secret access key, and a security token) that you
can use to access AWS resources that you might not normally have access to. Typically, you use
For cross-account access, imagine that you own multiple accounts and need to access resources in each account. You could create long-term credentials in each account to access those resources. However, managing all those credentials and remembering which one can access which account can be time consuming. Instead, you can create one set of long-term credentials in one account and then use temporary security credentials to access all the other accounts by assuming roles in those accounts. For more information about roles, see Roles in Using IAM .
For federation, you can, for example, grant single sign-on access to the AWS Management Console. If you already have an
identity and authentication system in your corporate network, you don't have to recreate user identities in AWS in order to grant those user
identities access to AWS. Instead, after a user has been authenticated, you call
The temporary security credentials are valid for the duration that you specified when calling
The temporary security credentials that are
returned from the
To assume a role, your AWS account must be trusted by the role. The trust
relationship is defined in the role's trust policy when the IAM role is created. You must also have a policy that allows you to call
Important: You cannot call
Namespace: Amazon.SecurityToken
Assembly: AWSSDK.dll
Version: 2.0.0.3
Syntax
public virtual AssumeRoleResponse AssumeRole( AssumeRoleRequest request )
Parameters
- request
-
Type: Amazon.SecurityToken.Model.AssumeRoleRequest
Type: Amazon.SecurityToken.Model.AssumeRoleResponse
The response from the AssumeRole service method, as returned by AmazonSecurityTokenService.
Exceptions
Version Information
.NET Framework:
Supported in: 4.5, 4.0, 3.5