OIDC

AWS STS Finally Lets You Write Trust Policies That Actually Mean Something

AWS STS Finally Lets You Write Trust Policies That Actually Mean Something

If you’ve ever written an IAM trust policy for GitHub Actions OIDC federation, you’ve probably done the thing we all did. You set the sub condition to repo:my-org/my-repo:*, told yourself “that’s scoped enough,” and moved on with your day.

Read More