Skip to content

Unit 5: Cloud IAM integration — AWS IAM Roles, GCP Workload Identity, Azure Managed Identity #45

@TeoSlayer

Description

@TeoSlayer

Scope

Cloud provider IAM as identity source. EC2 instances, ECS tasks, Lambda functions, GKE pods, and Azure VMs authenticate via their cloud IAM role/identity.

Deliverables

  • AWS: IAM Role → OIDC token via STS (AssumeRoleWithWebIdentity), instance profile token from metadata
  • GCP: Workload Identity tokens from metadata service, service account impersonation
  • Azure: Managed Identity tokens from IMDS, system-assigned and user-assigned
  • All three are OIDC issuers: validate via standard OIDC join rule with provider-specific presets
  • IAM role/identity → Pilot network mapping (e.g., role "data-pipeline-prod" → production network)
  • Zero-credential deployment: agents running on cloud VMs need no secrets, credentials come from cloud metadata

Priority: MEDIUM

Metadata

Metadata

Assignees

Labels

No labels
No labels

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions