-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow users to specify different credentials for source and target #12
Comments
I would like to propose that we support the ability to assume a separate role uploading to the target instead of using 2 separate sets of credentials. This would be more aligned with best practices than passing in 2 separate sets of credentials. My suggestion is to add new configuration options @alxcnt As this issue originated from your request, do you have any thoughts on this approach? |
Hello @Cole-Greer thanks for looking into this. |
Thanks @alxcnt, I also see from issue #16 that your setup already involves assuming roles. The credentials generated through role assumption are temporary and by default timeout after 1 hour. For large exports this is not enough time and credentials will need to be refreshed. Credential refreshing can be done if role assumption takes place within Neptune Export but not if credentials are only passed in externally. To extend my previous proposal, we could also pass in the role to use for target uploads via a |
Hello @Cole-Greer the thing with the role-based auth is that sometimes you'd like to use |
Hi @alxcnt, I understand that role-based auth does require slightly more initial setup but I believe it is justified by the security benefits highlighted above. We will proceed with adding support for role-based auth for exporting to both Kinesis and S3. |
Resolved with #35, users can now assume a different role for target uploads to S3 or Kinesis. (uses new --stream-role-arn or S3RoleArn parameters) |
neptune-export gets the credentials for accessing the Neptune Management AIP using the default provider chain (using env vars, system properties, Web identity token provider, profile, and EC2 container credentials, in that order). When querying an IAM auth enabled database, it looks for the necessary access key and secret key in the env vars and then system properties.
However, there are situations in which neptune-export may need a separate set of credentials to access the target (Amazon S3, or an Amazon Kinesis Data Stream). This can happen when the tool is reading data from Neptune in one account and writing to a target in another account.
This feature would allows users to specify different credentials for source and target.
The text was updated successfully, but these errors were encountered: