GetSessionTokenif you want to use MFA to protect programmatic calls to specific AWS APIs like Amazon EC2
StopInstances. MFA-enabled IAM users would need to call
GetSessionTokenand submit an MFA code that is associated with their MFA device. Using the temporary security credentials that are returned from the call, IAM users can then make programmatic calls to APIs that require MFA authentication. If you do not supply a correct MFA code, then the API returns an access denied error.
GetSessionToken action must be called by using the long-term AWS
security credentials of the AWS account or an IAM user. Credentials that are created
by IAM users are valid for the duration that you specify, between 900 seconds (15
minutes) and 129600 seconds (36 hours); credentials that are created by using account
credentials have a maximum duration of 3600 seconds (1 hour).
We recommend that you do not call
GetSessionToken with root account credentials.
Instead, follow our best
practices by creating one or more IAM users, giving them the necessary permissions,
and using IAM users for everyday interaction with AWS.
The permissions associated with the temporary security credentials returned by
are based on the permissions associated with account or IAM user whose credentials
are used to call the action. If
GetSessionToken is called using root
account credentials, the temporary credentials have root account permissions. Similarly,
GetSessionToken is called using the credentials of an IAM user, the
temporary credentials have the same permissions as the IAM user.
For more information about using
GetSessionToken to create temporary
credentials, go to Temporary
Credentials for Users in Untrusted Environments in the Using IAM.
Version: (assembly version)
public abstract GetSessionTokenResponse GetSessionToken( GetSessionTokenRequest request )
Container for the necessary parameters to execute the GetSessionToken service method.
|RegionDisabledException||STS is not activated in the requested region for the account that is being asked to create temporary credentials. The account administrator must activate STS in that region using the IAM Console. For more information, see Activating and Deactivating AWS STS in an AWS Region in the Using IAM.|
Supported in: 4.5, 4.0, 3.5