Examples of using Temporary security credentials in English and their translations into Spanish
{-}
-
Colloquial
-
Official
Using Temporary Security Credentials with the AWS SDKs.
For more information, see Revoking IAM Role Temporary Security Credentials.
Using Temporary Security Credentials with API Operations.
An IAM role provides applications andservices access to AWS resources using temporary security credentials.
Using Temporary Security Credentials with the AWS CLI.
People also translate
To learn how to revoke existingsessions for this role, see Revoking IAM Role Temporary Security Credentials.
Amazon Cognito returns temporary security credentials back to the application.
The following PHP example lists object keys in the specified bucket using temporary security credentials.
See the temporary security credentials documentation for more information.
For more information about which API to use,see Ways to Get Temporary Security Credentials in Using Temporary Security Credentials. .
For example, if the temporary security credentials were obtained by assuming a role, this element provides information about the assumed role.
For more information about using a session token for temporary access,see Requesting Temporary Security Credentials.
For information about requesting temporary security credentials, see Making Requests.
You can immediately revoke all permissions to a session by following the steps at Revoking IAM Role Temporary Security Credentials.
For information about creating temporary security credentials, see Requesting Temporary Security Credentials.
If you use IAM user credentials, you can specify the duration(from 1 to 36 hours)when requesting the temporary security credentials.
For more information about temporary security credentials, see Temporary Security Credentials in the IAM User Guide.
For more information about how AWS Security Token Service generates temporary access credentials, see Requesting Temporary Security Credentials in IAM User Guide.
For more information,see Using Temporary Security Credentials to Request Access to AWS Resources in the IAM User Guide.
For information about creating andworking with AWS STS credentials, see AWS Security Token Service API Reference and Using Temporary Security Credentials to Request Access to AWS Resources.
An AWS Account oran IAM user can request temporary security credentials and use them to send authenticated requests to Amazon S3.
However, temporary security credentials obtained through IAM roles and other features of the AWS Security Token Service expire after a short period of time.
Each one of your on-premises instances can assume this role to retrieve the temporary security credentials that provide the permissions granted to this role.
This API returns a set of temporary security credentials for federated users who are authenticated by your organization's existing identity system.
For more information about IAM support for temporary security credentials, see Temporary Security Credentials in the IAM User Guide.
When requesting temporary security credentials for the federated user(User1), the example specifies the following policy, which restricts access to list objects in a specific bucket.
In that case,the policy affects only the temporary security credentials that were created by the role before the specified date and time.
It also shows how to use the temporary security credentials returned by AssumeRole to list all Amazon S3 buckets in the account that owns the role.
To change orremove the permissions assigned to temporary security credentials, you can change or remove the permissions that are associated with the creator of the credentials. .
In the example, you obtain temporary security credentials for a two-hour session for your federated user and use the credentials to send authenticated requests to Amazon S3.