-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws-servicecatalog: giveAccessToRole using wildcards when sharing Principal Names #29770
Comments
Yes I agree. Can you share a little code snippets about this and what's the desired API experience with some sample? I am making it a p2 and we welcome any pull requests from the community to move this forward. |
Hello, thank you very much for your consideration. I'm not fully familiar with
I tend to prefer the option 2, because it is closer to the actual use case and current UI capability. Dear community, please share your opinion to help maintainers get a direction for the implementation. Thank you. |
Just an opinion. For the context, the AWS ServiceCatalog experience includes two general parts: Having this A-B relation model in mind here's a use-case. An actor representing the B part would like to provision a ServiceCatalog product from the ServiceCatalog portfolio, which is in turn protected by the ServiceCatalog portfolio grants (it's not possible to access the portfolio without this grant). To control the grants the product owner actor should use AssociatePrincipalWithPortfolio and DisassociatePrincipalFromPortfolio ServiceCatalog API methods. The product owner can supply here a very specific IAM principal ARN (corresponding to In my opinion, the 2nd option with |
Describe the feature
Allow to share AWS Service Catalog portfolio access with principal names that contains wildcards.
The feature seems to be possible given the following documentation link: https://docs.aws.amazon.com/servicecatalog/latest/adminguide/catalogs_portfolios_sharing_how-to-share.html#principal-name-share
Use Case
In the context of an AWS Organisation with SSO and multi-account permission set, the provisioned roles in the sub-accounts have an ARN pattern which contains each time a random number suffix (ex.: arn:aws:iam::${accountId}:role/${roleName}_{randomNumber}).
The ability to use giveAccessToRole with a string ARN pattern would allow us to share access to the portfolio across the entire organisation account with the people having the permission set.
Proposed Solution
No response
Other Information
No response
Acknowledgements
CDK version used
2.136.0
Environment details (OS name and version, etc.)
macos 14
The text was updated successfully, but these errors were encountered: