• Our product teams collect and evaluate feedback from a number of different sources. To learn more about how we use customer feedback in the planning process, check out our new feature policy.

      Currently, Bamboo requires the user to specify a specific User when configuring Elastic Bamboo.

      This feature request is to allow a user to specify an IAM Role instead of a specific user when configuring Elastic Bamboo. There is an existing feature request to allow Bamboo to use an IAM Role in all API requests to AWS [BAM-17341: Using 'Assume Role' for AWS API calls instead of traditional authentication key ID and secret key] but this does not explicitly address Configuring Elastic Bamboo and hence is hard for the users to find and vote on.

            [BAM-20817] Configure elastic bamboo with IAM role.

            Bamboo 8.2 Release Notes

            Introducing IAM Role support for Elastic Agents

            If you're running Bamboo on an EC2 instance in AWS, you can now authenticate Elastic Bamboo with an EC2 instance profile without worrying about rotating your AWS keys ever again.

            An instance profile is a container for an IAM role attached to an EC2 instance that provides short-lived, periodically rotated credentials. Bamboo can automatically detect and use such credentials to manage EC2 instances for Elastic Agents

            Jeremy Owen added a comment - Bamboo 8.2 Release Notes Introducing IAM Role support for Elastic Agents If you're running Bamboo on an EC2 instance in AWS, you can now authenticate Elastic Bamboo with an EC2 instance profile without worrying about rotating your AWS keys ever again. An instance profile is a container for an IAM role attached to an EC2 instance that provides short-lived, periodically rotated credentials. Bamboo can automatically detect and use such credentials to manage EC2 instances for Elastic Agents

            This is a critical need for us because our Bamboo instance currently runs in AWS. When using any IAM User our company requires that all static credentials be rotated on a regular basis. This leads to unnecessary overhead because it's something that we must manually perform on a regular basis. Ideally with the usage of an IAM role we wouldn't need to do anything because credentials are provisioned Just In Time. 

            Jean Desulme added a comment - This is a critical need for us because our Bamboo instance currently runs in AWS. When using any IAM User our company requires that all static credentials be rotated on a regular basis. This leads to unnecessary overhead because it's something that we must manually perform on a regular basis. Ideally with the usage of an IAM role we wouldn't need to do anything because credentials are provisioned Just In Time. 

              jmajkutewicz Jan Majkutewicz (Inactive)
              cberry@atlassian.com Chris Berry (Inactive)
              Votes:
              17 Vote for this issue
              Watchers:
              9 Start watching this issue

                Created:
                Updated:
                Resolved: