AWS
docs.aws.amazon.com › amazon eks › user guide › security in amazon eks › identity and access management for amazon eks
Identity and access management for Amazon EKS - Amazon EKS
AWS Identity and Access Management (IAM) is an AWS service that helps an administrator securely control access to AWS resources. IAM administrators control who can be authenticated (signed in) and authorized (have permissions) to use Amazon EKS resources.
AWS
docs.aws.amazon.com › amazon eks › user guide › learn how access control works in amazon eks › grant iam users and roles access to kubernetes apis › grant iam users access to kubernetes with eks access entries
Grant IAM users access to Kubernetes with EKS access entries - Amazon EKS
Fundamentally, an EKS access entry associates a set of Kubernetes permissions with an IAM identity, such as an IAM role. For example, a developer may assume an IAM role and use that to authenticate to an EKS Cluster. Centralized Authentication and Authorization: Controls access to Kubernetes ...
Videos
07:37
How do I manage permissions across namespaces for IAM users in ...
05:55
How do I provide access to other IAM users and roles after cluster ...
07:15
How to Add IAM User and IAM Role to AWS EKS Cluster? - YouTube
35:13
Kubernetes(EKS) + AWS IAM - Access Management and Control || RBAC ...
05:54
Controlling EKS access with AWS IAM - YouTube
AWS
docs.aws.amazon.com › amazon eks › user guide › security in amazon eks › identity and access management for amazon eks › amazon eks identity-based policy examples
Amazon EKS identity-based policy examples - Amazon EKS
By default, IAM users and roles don’t have permission to create or modify Amazon EKS resources. They also can’t perform tasks using the AWS Management Console, AWS CLI, or AWS API. An IAM administrator must create IAM policies that grant users and roles permission to perform specific API ...
AWS
docs.aws.amazon.com › amazon eks › user guide › learn how access control works in amazon eks › grant kubernetes workloads access to aws using kubernetes service accounts › iam roles for service accounts
IAM roles for service accounts - Amazon EKS
You can’t use IAM roles for service accounts with local clusters for Amazon EKS on AWS Outposts. IAM roles for service accounts provide the following benefits: Least privilege – You can scope IAM permissions to a service account, and only Pods that use that service account have access to ...
AWS
docs.aws.amazon.com › amazon eks › user guide › learn how access control works in amazon eks › grant iam users and roles access to kubernetes apis
Grant IAM users and roles access to Kubernetes APIs - Amazon EKS
Learn how to grant access to Kubernetes APIs on Amazon EKS clusters using IAM roles, users, or OpenID Connect providers, and manage permissions with access entries or the aws-auth ConfigMap.
AWS
docs.aws.amazon.com › amazon eks › user guide › security in amazon eks › identity and access management for amazon eks › amazon eks cluster iam role
Amazon EKS cluster IAM role - AWS Documentation
Prior to October 3, 2023, AmazonEKSClusterPolicy was required on the IAM role for each cluster. Prior to April 16, 2020, AmazonEKSServicePolicy and AmazonEKSClusterPolicy was required and the suggested name for the role was eksServiceRole. With the AWSServiceRoleForAmazonEKS service-linked role, the AmazonEKSServicePolicy policy is no longer required for clusters created on or after April 16, 2020.
AWS
docs.aws.amazon.com › amazon eks › user guide › security in amazon eks › identity and access management for amazon eks › how amazon eks works with iam
How Amazon EKS works with IAM - Amazon EKS
November 3, 2022 - When you create an Amazon EKS cluster, the IAM principal that creates the cluster is automatically granted system:masters permissions in the cluster's role-based access control (RBAC) configuration in the Amazon EKS control plane. This principal doesn't appear in any visible configuration, ...
AWS
aws.amazon.com › blogs › containers › session-policies-for-amazon-eks-pod-identity
Session policies for Amazon EKS Pod Identity | Amazon Web Services
March 24, 2026 - This feature addressed many of the existing challenges of IAM Roles for Service Accounts (IRSA) by removing the need to set up OpenID Connect (OIDC) providers for EKS clusters, streamlining IAM trust policies, and streamlining the experience through Amazon EKS APIs. Furthermore, it introduced support for IAM role session tags, so IAM administrators can author a single permissions policy that can work across roles by allowing access to AWS resources based on matching tags.
AWS
docs.aws.amazon.com › identity and access management › service authorization reference › reference › actions, resources, and condition keys for aws services › actions, resources, and condition keys for amazon elastic kubernetes service
Actions, resources, and condition keys for Amazon Elastic Kubernetes Service - Service Authorization Reference
Amazon Elastic Kubernetes Service (service prefix: eks) provides the following service-specific resources, actions, and condition context keys for use in IAM permission policies.
Open Source at AWS
aws.github.io › aws-eks-best-practices › security › docs › iam
Identity and Access Management - EKS Best Practices Guides
If you need to grant an IAM user access to an EKS cluster, create an entry in the aws-auth ConfigMap for that user that maps to a specific Kubernetes RBAC group. By default Amazon EKS clusters are created with a permanent cluster-admin permission bound to the cluster creator principal.
AWS re:Post
repost.aws › knowledge-center › eks-iam-permissions-namespaces
Manage permissions across namespaces for IAM users in Amazon EKS clusters | AWS re:Post
January 12, 2024 - To manage user permissions across namespaces in an Amazon EKS cluster, complete the following steps: Create an IAM role for the members of your organization to assume. Create a Kubernetes role-based access control (RBAC) role (Role) and role ...
AWS
docs.aws.amazon.com › amazon eks › user guide › allowing users to access your cluster › enabling iam principal access to your cluster
Enabling IAM principal access to your cluster - Amazon EKS
February 28, 2023 - [...] 2022-05-09 14:51:20 [ℹ] adding identity "arn:aws:iam::111122223333:role/my-role" to auth ConfigMap · Add a mapping for a user. IAM best practices recommend that you grant permissions to roles instead of users. Replace my-user with your user name. Replace eks-console-dashboard-rest...
AWS
docs.aws.amazon.com › amazon eks › user guide › security in amazon eks › identity and access management for amazon eks › aws managed policies for amazon elastic kubernetes service
AWS managed policies for Amazon Elastic Kubernetes Service - Amazon EKS
This policy includes the following permissions that allow Amazon EKS to complete the following tasks: ecr – Allows Pods that are running on Fargate to pull container images that are stored in Amazon ECR. To view the latest version of the JSON policy document, see AmazonEKSFargatePodExecutionRolePolicy in the AWS Managed Policy Reference Guide. You can’t attach AmazonEKSConnectorServiceRolePolicy to your IAM entities.
eksctl
eksctl.io › aws › amazon eks › amazon eks › iam › iam roles for service accounts
IAM Roles for Service Accounts - Eksctl User Guide
Once an IAM Role is created, a service account should include the ARN of that role as an annotation (eks.amazonaws.com/role-arn). By default the service account will be created or updated to include the role annotation, this can be disabled using the flag --role-only. ... that injects AWS session credentials into pods respectively of the roles based on the annotation on the Service Account used by the pod.
AWS
docs.aws.amazon.com › amazon eks › user guide › learn how access control works in amazon eks › grant iam users and roles access to kubernetes apis › grant iam users access to kubernetes with eks access entries › review access policy permissions
Review access policy permissions - Amazon EKS
If you want an IAM principal to have administrator access to all resources on your cluster, associate the AmazonEKSClusterAdminPolicy access policy to your access entry instead. ARN – arn:aws:eks::aws:cluster-access-policy/AmazonEKSAdminPolicy · This access policy includes permissions that grant ...
AWS
docs.aws.amazon.com › amazon eks › best practices guide › best practices for security › identity and access management
Identity and Access Management - Amazon EKS
It is also possible to map permissions ... always recommended to user mapRoles instead. To manage permissions, you can edit the aws-auth ConfigMap adding or removing access to your Amazon EKS cluster....
AWS
aws.amazon.com › blogs › aws › amazon-eks-pod-identity-simplifies-iam-permissions-for-applications-on-amazon-eks-clusters
Amazon EKS Pod Identity simplifies IAM permissions for applications on Amazon EKS clusters | AWS News Blog
December 6, 2023 - Simplifying experience with Amazon EKS Pod Identity In 2019, we introduced IAM roles for service accounts (IRSA). IRSA lets you associate an IAM role with a Kubernetes service account. This helps you to implement the principle of least privilege by giving pods only the permissions they need. This approach prioritizes pods in IAM and helps developers configure applications with fine-grained permissions that enable the least privileged access to AWS services.
AWS
docs.aws.amazon.com › amazon eks › user guide › security in amazon eks › identity and access management for amazon eks › amazon eks node iam role
Amazon EKS node IAM role - AWS Documentation
The Amazon EKS node kubelet daemon makes calls to AWS APIs on your behalf. Nodes receive permissions for these API calls through an IAM instance profile and associated policies. Before you can launch nodes and register them into a cluster, you must create an IAM role for those nodes to use ...
eksctl
eksctl.io › aws › amazon eks › amazon eks › iam › minimum iam policies
Minimum IAM policies - Eksctl User Guide
This document describes the minimum IAM policies needed to run the main use cases of eksctl. These are the ones used to run the integration tests. Remember to replace <account_id> with your own. An AWS Managed Policy is created and administered by AWS. You cannot change the permissions defined ...