✨ AWS Session Tags ✨
The OIDC token, with each env0 deployment, included additional claims like the organization id, project id, and deployer email, to give you more control over who can access your cloud account and with which role. However, with AWS you couldn’t use the custom claims in your JWT token as other vendors allow. Instead, AWS supports session tags. Using your (AWS IAM Role) trust policy, you can verify those tags, and add rules on top of them as you please. Now, we added new claims to the JWT token that includes a new claim calledhttps://aws.amazon.com/tags
which will include a principal_tags
section with the following claims:
organizationId
- The env0 Organization IDprojectId
- The env0 Project IDtemplateId
- The env0 Template IDenvironmentId
- The env0 Environment IDdeployerEmail
- The email address of the user who created this deployment
❗️ Breaking Change
This introduces a breaking change! You will need to add the sts:TagSession
permission to the role for any existing AWS Role authenticating with OIDC, whether you’re using session tags or not. This feature will be released on the 19th of June.