Navigate:
Configure AWS Credentials
~$CAC0.3%

configure-aws-credentials: AWS authentication for GitHub Actions

GitHub Action for AWS credential resolution in workflows.

LIVE RANKINGS • 12:33 PM • STEADY
OVERALL
#307
97
CLOUD & DEVOPS
#19
8
30 DAY RANKING TREND
ovr#307
·Cloud#19
STARS
2.9K
FORKS
558
7D STARS
+9
7D FORKS
+1
See Repo:
Share:

Learn more about Configure AWS Credentials

configure-aws-credentials is a GitHub Action that establishes AWS authentication within workflow environments by setting credential-related environment variables. The action implements multiple credential resolution paths including OpenID Connect token exchange, static credential re-export, and AWS STS AssumeRole operations. It leverages the AWS JavaScript SDK credential resolution flow for Node.js, allowing workflows to access AWS resources through various identity mechanisms. Common deployment patterns include CI/CD pipelines requiring AWS API access, infrastructure automation, and deployment workflows that interact with AWS services.

Configure AWS Credentials

1

Multiple authentication methods

Supports five distinct authentication scenarios including OIDC token exchange, static IAM credentials, STS AssumeRole with static credentials, web identity token flows, and credential chaining. This flexibility accommodates different security postures and organizational requirements.

2

OIDC-based temporary credentials

Implements GitHub OIDC provider integration to obtain temporary credentials without storing long-lived secrets in repositories. The action uses federated identity with configurable trust policies scoped to specific repositories and branches.

3

AWS SDK credential resolution integration

Operates within the AWS JavaScript SDK's credential resolution chain, allowing the action to work alongside other credential sources and respecting standard AWS credential precedence rules. This design enables role chaining and credential composition patterns.


// In your GitHub Actions workflow JavaScript step
import * as core from '@actions/core';
import { STSClient, GetCallerIdentityCommand } from '@aws-sdk/client-sts';

// Credentials are already set by configure-aws-credentials action
const stsClient = new STSClient({ region: 'us-east-1' });
const identity = await stsClient.send(new GetCallerIdentityCommand({}));
core.info(`Authenticated as: ${identity.Account}`);

vv6.0.0

Major update to Node 24 with transitive tag keys support and improved role-chaining output.

  • Update action to use node24 - requires GitHub action runner version v2.327.1 or later
  • add support to define transitive tag keys
  • properly output `aws-account-id` and `authenticated-arn` when using role-chaining
vv5.1.1

Maintenance release with dependency updates and no functional changes.

  • various dependency updates
vv5.1.0

Adds global timeout support, no-proxy configuration, and improves debug logging.

  • Add global timeout support
  • add no-proxy support
  • Improve debug logging in retry logic
  • properly expose getProxyForUrl


[ EXPLORE MORE ]

Related Repositories

Discover similar tools and frameworks used by developers