start a session as ssm-user with runAs option #394
start a session as ssm-user with runAs option #394gurpalw wants to merge 1 commit intoaws:mainlinefrom
ssm-user with runAs option #394Conversation
ssm-user if RunAs is enabled and if the user wants to use ssm-user
ssm-user if RunAs is enabled and if the user wants to use ssm-userssm-user with runAS option
ssm-user with runAS option ssm-user with runAs option
|
RunAs default behavior is confusing and poorly documented. If you use different roles tagged with different users for the same instances (pretty normal scenario) then one of these roles cannot be tagged with "ssm-user" until you access the instance with an existing user and create the ssm-user. If you remove the RunAs config from the SSM setup then your tagged users cannot get in...and if you do that after launching the instance then you're out of luck. |
|
Can this move forward? This behavior is universally described by users as bad. Having this would unblock a much needed ability to protect access to machines as @laurentlgm described. If you look at the github issues related to this topic, AWS seems to be going through and just closing them which is odd considering this is a clear use case that should be supported. |
#217
Issue #217, if available:
#217
Description of changes:
If
RunAsis enabled, and theRunAsuser is set tossm-user, the session will fail to start.This change fixes that by allowing the user/role creating the ssm session to use
ssm-user, and creates the account for them in the same way as whenRunAsis not enabled.By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.