Skip to content

SYSTEM Cited by 4 sources

AWS Identity and Access Management (IAM)

What it is

AWS Identity and Access Management (IAM) is AWS's per-partition authorization system — the service that evaluates whether a given principal is allowed to take a given action on a given resource under a given set of policies. Combined with AWS STS for short-lived credentials, IAM Identity Center for federation, Organizations for multi-account policy hierarchy (via SCPs), and Cedar / the AWS policy interpreter for the policy semantics.

The per-partition property

A central architectural fact across the sovereign-failover literature: IAM is bound to an AWS partition. "Each partition is a logically isolated group of AWS Regions with its own set of resources, including AWS Identity and Access Management (IAM). Because of this separation, partitions act as hard boundaries. Credentials don't carry over." (Source: sources/2026-01-30-aws-sovereign-failover-design-digital-sovereignty)

This property is what forces cross-partition auth to be an explicit architecture problem rather than a transparent capability.

Cross-partition IAM design patterns

When an identity in one partition must act against a resource in another partition, IAM provides five composable tactics (Source: sources/2026-01-30-aws-sovereign-failover-design-digital-sovereignty):

Stub page

This page exists to anchor IAM's role in the cross-partition failover and centralized-federation patterns. AWS IAM also surfaces in the automated-reasoning work (Cedar, Zelkova, IAM Access Analyzer) — see that page for the formal-methods lineage.

OIDC Identity Provider + web-identity federation

IAM exposes an Identity Provider resource type for registering an external OIDC IdP ("arn:aws:iam::<account>:oidc-provider/<issuer-host>/<path>"), after which a Role's trust policy can name that IdP as its Federated principal with action sts:AssumeRoleWithWebIdentity. Combined with STS's AssumeRoleWithWebIdentity API, this lets non-AWS workloads (GitHub Actions, EKS Pods via IRSA, Fly Machines, etc.) obtain AWS credentials without any long-lived AWS keypair. See OIDC federation for cloud access and patterns/oidc-role-assumption-for-cross-cloud-auth.

Canonical wiki walkthrough: the Fly.io AWS without Access Keys post, which ships the full trust-policy shape (Principal.Federated = IdP ARN, Condition.StringEquals on aud, Condition.StringLike on sub) and the observation that "this is a rare instance where you can reasonably drive the entire AWS side of the process from within the web console." Most cross-cloud IAM federation today happens through this path.

Seen in

Last updated · 200 distilled / 1,178 read