Replies: 3 comments
-
| Turned out it was a permission issue. it worked using AWS CLI because my command didn't configure session tagging and the user didn't have the |
Beta Was this translation helpful? Give feedback.
0 replies
-
| Hello! Reopening this discussion to make it searchable. |
Beta Was this translation helpful? Give feedback.
0 replies
-
| We could have alternatively used |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I tried following this example but it keeps retrying and eventually fail with the message:
Could not assume role with user credentials: User: arn:aws:iam::***:user/*** is not authorized to perform: sts:TagSession on resource: ***The user supposedly has the right permissions as it worked properly from my terminal using the same IAM Credentials and also worked okay with a workflow that uses aws-cli, I will post both files for reference:
Beta Was this translation helpful? Give feedback.
All reactions