<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Openid on My Blog</title><link>https://jamesteddy.com/tags/openid/</link><description>Recent content in Openid on My Blog</description><generator>Hugo -- 0.136.5</generator><language>en-us</language><lastBuildDate>Wed, 01 Jan 2025 14:43:37 +0100</lastBuildDate><atom:link href="https://jamesteddy.com/tags/openid/index.xml" rel="self" type="application/rss+xml"/><item><title>IAM Role to Access AWS accounts for Github Actions</title><link>https://jamesteddy.com/posts/proper-github-actions/</link><pubDate>Wed, 01 Jan 2025 14:43:37 +0100</pubDate><guid>https://jamesteddy.com/posts/proper-github-actions/</guid><description>&lt;p>I have always wondered the best course of action when giving access to a repo from Github to access and deploy resources to AWS.
More often than not, what I see is using credentials in the from of AWS Secret and Access keys curated from a user on AWS IAM.
I believein exploring everything through &lt;strong>Infrastructure as Code (IAC)&lt;/strong>.&lt;/p>
&lt;p>This blog post would be exploring using IAM Roles and setting it up through cloudformation, and granting access to the role and implementing the role in Github Actions. I would be leveraging &lt;a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers.html">AWS IAM Idenity Provider&lt;/a>, specifically the &lt;strong>OpenID Connect (OIDC)&lt;/strong>.&lt;br>
Basically, there are 3 parties involved, an OIDC provider, a user and an application. If a user goes to an application and instead of filling the form, using a username and a password, they could decided to sign up using an OIDC provider (Signup with Google as an example). In that case, Google handles the authentication process also optaining the consent from the user to provide the specific information needed by the application. For more on OpenID Connect, read this blog from Microsoft &lt;a href="https://www.microsoft.com/en-us/security/business/security-101/what-is-openid-connect-oidc?ef_id=_k_Cj0KCQiAyoi8BhDvARIsAO_CDsC46Z_TiPY_6Yday5NJU0UCSjnB93J5IDoUQwxEhBGx-e6iWGMAs1gaAhsDEALw_wcB_k_&amp;amp;OCID=AIDcmmdamuj0pc_SEM__k_Cj0KCQiAyoi8BhDvARIsAO_CDsC46Z_TiPY_6Yday5NJU0UCSjnB93J5IDoUQwxEhBGx-e6iWGMAs1gaAhsDEALw_wcB_k_&amp;amp;gad_source=1&amp;amp;gclid=Cj0KCQiAyoi8BhDvARIsAO_CDsC46Z_TiPY_6Yday5NJU0UCSjnB93J5IDoUQwxEhBGx-e6iWGMAs1gaAhsDEALw_wcB">here.&lt;/a>&lt;/p></description></item></channel></rss>