Replies: 3 comments
-
Turned out it was a permission issue. it worked using AWS CLI because my command didn't configure session tagging and the user didn't have the |
Beta Was this translation helpful? Give feedback.
-
Hello! Reopening this discussion to make it searchable. |
Beta Was this translation helpful? Give feedback.
-
We could have alternatively used |
Beta Was this translation helpful? Give feedback.
-
I tried following this example but it keeps retrying and eventually fail with the message:
Could not assume role with user credentials: User: arn:aws:iam::***:user/*** is not authorized to perform: sts:TagSession on resource: ***
The user supposedly has the right permissions as it worked properly from my terminal using the same IAM Credentials and also worked okay with a workflow that uses aws-cli, I will post both files for reference:
Beta Was this translation helpful? Give feedback.
All reactions