How AWS CodeStar Works with IAM - AWS CodeStar

On July 31, 2024, Amazon Web Services (AWS) will discontinue support for creating and viewing AWS CodeStar projects. After July 31, 2024, you will no longer be able to access the AWS CodeStar console or create new projects. However, the AWS resources created by AWS CodeStar, including your source repositories, pipelines, and builds, will be unaffected by this change and will continue to function. AWS CodeStar Connections will not be impacted by this discontinuation.

 

If you wish to track work, develop code, and build, test, and deploy your applications, Amazon CodeCatalyst provides a streamlined getting started process and additional functionality to manage your software projects. Learn more about functionality and pricing of Amazon CodeCatalyst.

How AWS CodeStar Works with IAM

Before you use IAM to manage access to AWS CodeStar, you should understand what IAM features are available to use with AWS CodeStar. To get a high-level view of how AWS CodeStar and other AWS services work with IAM, see AWS Services That Work with IAM in the IAM User Guide.

AWS CodeStar Identity-Based Policies

With IAM identity-based policies, you can specify allowed or denied actions and resources and the conditions under which actions are allowed or denied. AWS CodeStar creates several identity-based policies on your behalf, which allow AWS CodeStar to create and manage resources within the scope of an AWS CodeStar project. AWS CodeStar supports specific actions, resources, and condition keys. To learn about all of the elements that you use in a JSON policy, see IAM JSON Policy Elements Reference in the IAM User Guide.

Actions

Administrators can use AWS JSON policies to specify who has access to what. That is, which principal can perform actions on what resources, and under what conditions.

The Action element of a JSON policy describes the actions that you can use to allow or deny access in a policy. Policy actions usually have the same name as the associated AWS API operation. There are some exceptions, such as permission-only actions that don't have a matching API operation. There are also some operations that require multiple actions in a policy. These additional actions are called dependent actions.

Include actions in a policy to grant permissions to perform the associated operation.

Policy actions in AWS CodeStar use the following prefix before the action: codestar:. For example, to allow a specified IAM user to edit the attributes of an AWS CodeStar project, such as its project description, you could use the following policy statement:

{ "Version": "2012-10-17", "Statement" : [ { "Effect" : "Allow", "Action" : [ "codestar:UpdateProject" ], "Resource" : "arn:aws:codestar:us-east-2:project/my-first-projec" } ] }

Policy statements must include either an Action or NotAction element. AWS CodeStar defines its own set of actions that describe tasks that you can perform with this service.

To specify multiple actions in a single statement, separate them with commas as follows:

"Action": [ "codestar:action1", "codestar:action2"

You can specify multiple actions using wildcards (*). For example, to specify all actions that begin with the word List, include the following action:

"Action": "codestar:List*"

To see a list of AWS CodeStar actions, see Actions Defined by AWS CodeStar in the IAM User Guide.

Resources

Administrators can use AWS JSON policies to specify who has access to what. That is, which principal can perform actions on what resources, and under what conditions.

The Resource JSON policy element specifies the object or objects to which the action applies. Statements must include either a Resource or a NotResource element. As a best practice, specify a resource using its Amazon Resource Name (ARN). You can do this for actions that support a specific resource type, known as resource-level permissions.

For actions that don't support resource-level permissions, such as listing operations, use a wildcard (*) to indicate that the statement applies to all resources.

"Resource": "*"

The AWS CodeStar project resource has the following ARN:

arn:aws:codestar:region:account:project/resource-specifier

For more information about the format of ARNs, see Amazon Resource Names (ARNs) and AWS Service Namespaces.

For example, the following specifies the AWS CodeStar project named my-first-projec registered to the AWS account 111111111111 in the AWS Region us-east-2:

arn:aws:codestar:us-east-2:111111111111:project/my-first-projec

The following specifies any AWS CodeStar project that begins with the name my-proj registered to the AWS account 111111111111 in the AWS Region us-east-2:

arn:aws:codestar:us-east-2:111111111111:project/my-proj*

Some AWS CodeStar actions, such as for listing projects, cannot be performed on a resource. In those cases, you must use the wildcard (*).

"LisProjects": "*"

To see a list of AWS CodeStar resource types and their ARNs, see Resources Defined by AWS CodeStar in the IAM User Guide. To learn with which actions you can specify the ARN of each resource, see Actions Defined by AWS CodeStar.

Condition Keys

AWS CodeStar does not provide any service-specific condition keys, but it does support using some global condition keys. To see all AWS global condition keys, see AWS Global Condition Context Keys in the IAM User Guide.

Examples

To view examples of AWS CodeStar identity-based policies, see AWS CodeStar Identity-Based Policy Examples.

AWS CodeStar Resource-Based Policies

AWS CodeStar does not support resource-based policies.

Authorization Based on AWS CodeStar Tags

You can attach tags to AWS CodeStar projects or pass tags in a request to AWS CodeStar. To control access based on tags, you provide tag information in the condition element of a policy using the codestar:ResourceTag/key-name, aws:RequestTag/key-name, or aws:TagKeys condition keys. For more information about tagging AWS CodeStar resources, see Working with Project Tags in AWS CodeStar.

To view an example identity-based policy for limiting access to an AWS CodeStar project based on the tags on that project, see Viewing AWS CodeStar Projects Based on Tags.

AWS CodeStar IAM Roles

An IAM role is an entity in your AWS account that has specific permissions.

You can use AWS CodeStar as an IAM user, a federated user, the root user, or an assumed role. All user types with the appropriate permissions can manage project permissions to their AWS resources, but AWS CodeStar manages project permissions automatically for IAM users. IAM policies and roles grant permissions and access to that user based on the project role. You can use the IAM console to create other policies that assign AWS CodeStar and other permissions to an IAM user.

For example, you might want to allow a user to view, but not change, an AWS CodeStar project. In this case, you add the IAM user to an AWS CodeStar project with the viewer role. Every AWS CodeStar project has a set of policies that help you control access to the project. In addition, you can control which users have access to AWS CodeStar.

AWS CodeStar access is handled differently for IAM users and federated users. Only IAM users can be added to teams. To grant IAM users permissions to projects, you add the user to the project team and assign the user a role. To grant federated users permissions to projects, you manually attach the AWS CodeStar project role's managed policy to the federated user's role.

This table summarizes the tools available for each type of access.

Permissions feature IAM user Federated user Root user
SSH key management for remote access for Amazon EC2 and Elastic Beanstalk projects
AWS CodeCommit SSH access
IAM user permissions managed by AWS CodeStar
Project permissions managed manually
Users can be added to project as team members

IAM user Access to AWS CodeStar

When you add an IAM user to a project and choose a role for the user, AWS CodeStar applies the appropriate policy to the IAM user automatically. For IAM users, you don't need to directly attach or manage policies or permissions in IAM. For information about adding an IAM user to an AWS CodeStar project, see Add Team Members to an AWS CodeStar Project . For information about removing an IAM user from an AWS CodeStar project, see Remove Team Members from an AWS CodeStar Project .

Attach an Inline Policy to an IAM user

When you add a user to a project, AWS CodeStar automatically attaches the managed policy for the project that matches the user's role. You should not manually attach an AWS CodeStar managed policy for a project to an IAM user. With the exception of AWSCodeStarFullAccess, we do not recommend that you attach policies that change an IAM user's permissions in an AWS CodeStar project. If you decide to create and attach your own policies, see Adding and Removing IAM Identity Permissions in the IAM User Guide.

Federated User Access to AWS CodeStar

Instead of creating an IAM user or using the root user, you can use user identities from AWS Directory Service, your enterprise user directory, a web identity provider, or IAM users assuming roles. These are known as federated users.

Grant federated users access to your AWS CodeStar project by manually attaching the managed policies described in AWS CodeStar Project-Level Policies and Permissions to the user's IAM role. You attach the owner, contributor, or viewer policy after AWS CodeStar creates your project resources and IAM roles.

Prerequisites:

  • You must have set up an identity provider. For example, you could set up a SAML identity provider and set up AWS authentication through the provider. For more information about setting up an identity provider, see Creating IAM Identity Providers. For more information about SAML federation, see About SAML 2.0-based Federation.

  • You must have created a role for a federated user to assume when access is requested through an identity provider. An STS trust policy must be attached to the role that allows federated users to assume the role. For more information, see Federated Users and Roles in the IAM User Guide.

  • You must have created your AWS CodeStar project and know the project ID.

For more information about creating a role for identity providers, see Creating a Role for a Third-Party Identity Provider (Federation).

Attach the AWSCodeStarFullAccess Managed Policy to the Federated User's Role

Grant a federated user permissions to create a project by attaching the AWSCodeStarFullAccess managed policy. To perform these steps, you must have signed in to the console either as a root user, an administrator user in the account, or an IAM user or federated user with the associated AdministratorAccess managed policy or equivalent.

Note

After you create the project, your project owner permissions are not applied automatically. Using a role with administrative permissions for your account, attach the owner managed policy, as described in Attach Your Project's AWS CodeStar Viewer/Contributor/Owner Managed Policy to the Federated User's Role.

  1. Open the IAM console. In the navigation pane, choose Policies.

  2. Enter AWSCodeStarFullAccess in the search field. The policy name is displayed, with a policy type of AWS managed. You can expand the policy to see the permissions in the policy statement.

  3. Select the circle next to the policy, and then under Policy actions, choose Attach.

  4. On the Summary page, choose the Attached entities tab. Choose Attach.

  5. On the Attach Policy page, filter for the federated user's role in the search field. Select the box next to the name of the role, and then choose Attach policy. The Attached entities tab displays the new attachment.

Attach Your Project's AWS CodeStar Viewer/Contributor/Owner Managed Policy to the Federated User's Role

Grant federated users access to your project by attaching the appropriate owner, contributor, or viewer managed policy to the user's role. The managed policy gives the appropriate level of permissions. Unlike IAM users, you must manually attach and detach managed policies for federated users. This is equivalent to assigning project permissions to team members in AWS CodeStar. To perform these steps, you must have signed in to the console either as a root user, an administrator user in the account, or an IAM user or federated user with the associated AdministratorAccess managed policy or equivalent.

Prerequisites:

  • You must have created a role or have an existing role that your federated user assumes.

  • You must know which level of permissions you want to grant. The managed policies attached to the owner, contributor, and viewer roles provide role-based permissions for your project.

  • Your AWS CodeStar project must have been created. The managed policy is not available in IAM until the project is created.

  1. Open the IAM console. In the navigation pane, choose Policies.

  2. Enter your project ID in the search field. The policy name matching your project is displayed, with a policy type of Customer managed. You can expand the policy to see the permissions in the policy statement.

  3. Choose one of these managed policies. Select the circle next to the policy, and then under Policy actions, choose Attach.

  4. On the Summary page, choose the Attached entities tab. Choose Attach.

  5. On the Attach Policy page, filter for the federated user's role in the search field. Select the box next to the name of the role and then choose Attach policy. The Attached entities tab displays the new attachment.

Detach an AWS CodeStar Managed Policy from the Federated User's Role

Before you delete your AWS CodeStar project, you must manually detach any managed policies you attached to a federated user's role. To perform these steps, you must have signed in to the console either as a root user, an administrator user in the account, or an IAM user or federated user with the associated AdministratorAccess managed policy or equivalent.

  1. Open the IAM console. In the navigation pane, choose Policies.

  2. Enter your project ID in the search field.

  3. Select the circle next to the policy, and then under Policy actions, choose Attach.

  4. On the Summary page, choose the Attached entities tab.

  5. Filter for the federated user's role in the search field. Choose Detach.

Attach an AWS Cloud9 Managed Policy to the Federated User's Role

If you are using an AWS Cloud9 development environment, grant federated users access to it by attaching the AWSCloud9User managed policy to the user's role. Unlike IAM users, you must manually attach and detach managed policies for federated users. To perform these steps, you must have signed in to the console either as a root user, an administrator user in the account, or an IAM user or federated user with the associated AdministratorAccess managed policy or equivalent.

Prerequisites:

  • You must have created a role or have an existing role that your federated user assumes.

  • You must know which level of permissions you want to grant:

    • The AWSCloud9User managed policy allows the user to do the following:

      • Create their own AWS Cloud9 development environments.

      • Get information about their environments.

      • Change the settings for their environments.

    • The AWSCloud9Administrator managed policy allows the user to do the following for themselves or others:

      • Create environments.

      • Get information about environments.

      • Delete environments.

      • Change the settings of environments.

  1. Open the IAM console. In the navigation pane, choose Policies.

  2. Enter the policy name in the search field. The managed policy is displayed, with a policy type of AWS managed. You can expand the policy to see the permissions in the policy statement.

  3. Choose one of these managed policies. Select the circle next to the policy, and then under Policy actions, choose Attach.

  4. On the Summary page, choose the Attached entities tab. Choose Attach.

  5. On the Attach Policy page, filter for the federated user's role in the search field. Choose the box next to the name of the role and then choose Attach policy. The Attached entities tab displays the new attachment.

Detach an AWS Cloud9 Managed Policy from the Federated User's Role

If you are using an AWS Cloud9 development environment, you can remove a federated user's access to it by detaching the policy that grants access. To perform these steps, you must have signed in to the console either as a root user, an administrator user in the account, or an IAM user or federated user with the associated AdministratorAccess managed policy or equivalent.

  1. Open the IAM console. In the navigation pane, choose Policies.

  2. Enter your project name in the search field.

  3. Select the circle next to the policy, and then under Policy actions, choose Attach.

  4. On the Summary page, choose the Attached entities tab.

  5. Filter for the federated user's role in the search field. Choose Detach.

Using Temporary Credentials with AWS CodeStar

You can use temporary credentials to sign in with federation, assume an IAM role, or to assume a cross-account role. You obtain temporary security credentials by calling AWS STS API operations such as AssumeRole or GetFederationToken.

AWS CodeStar supports the use of temporary credentials, but the AWS CodeStar team member functionality doesn't work for federated access. AWS CodeStar team member functionality only supports adding an IAM user as a team member.

Service-Linked Roles

Service-linked roles allow AWS services to access resources in other services to complete an action on your behalf. Service-linked roles appear in your IAM account and are owned by the service. An administrator can view, but cannot edit, the permissions for service-linked roles.

AWS CodeStar does not support service-linked roles.

Service Roles

This feature allows a service to assume a service role on your behalf. This role allows the service to access resources in other services to complete an action on your behalf. Service roles appear in your IAM account and are owned by the account. This means that an administrator can change the permissions for this role. However, doing so might break the functionality of the service.

AWS CodeStar supports service roles. AWS CodeStar uses a service role, aws-codestar-service-role, when it creates and manages the resources for your project. For more information, see Roles Terms and Concepts in the IAM User Guide.

Important

You must be signed in as an administrator user or root account to create this service role. For more information, see First-Time Access Only: Your root user Credentials and Creating Your First Admin User and Group in the IAM User Guide.

This role is created for you the first time you create a project in AWS CodeStar. The service role acts on your behalf to:

  • Create the resources you choose when you create a project.

  • Display information about those resources in the AWS CodeStar project dashboard.

It also acts on your behalf when you manage the resources for a project. For an example of this policy statement, see AWSCodeStarServiceRole Policy.

In addition, AWS CodeStar creates several project-specific service roles, depending on the project type. AWS CloudFormation and toolchain roles are created for each project type.

  • AWS CloudFormation roles allow AWS CodeStar to access AWS CloudFormation to create and modify stacks for your AWS CodeStar project.

  • Toolchain roles allow AWS CodeStar to access other AWS services to create and modify resources for your AWS CodeStar project.