AWS STS now supports validation of select identity provider specific claims from Google, GitHub, CircleCI and OCI

AWS IAM ยท 2026-02-02

Actions

Rate this issue

Technical Details

Regions all
Cost Impact Neutral
IaC Impact High

What This Means

For DevOps Teams

Update your IAM role trust policies and resource control policies to include the new identity provider specific claims from Google, GitHub, CircleCI, and OCI, ensuring your federated identities have the appropriate access controls in place.

For Platform Teams

Adopt the new OIDC claim validation capability to simplify your architecture by leveraging custom claims as condition keys in IAM role trust policies and resource control policies, reducing operational toil and improving security.

For Executives

Evaluate the new OIDC claim validation capability to enhance your organization's security posture by implementing fine-grained access control for federated identities, thereby reducing risk exposure and strengthening data perimeters.

Source

View original AWS announcement โ†’

Related AWS IAM Updates

Weekly AWS Digest in Your Inbox

No spam, no headlines. Just a weekly summary of the 3โ€“7 AWS changes that matter for DevOps and Platform teams.

๐Ÿ“ง Exactly 1 email per week โ€ข Every Tuesday โ€ข Unsubscribe anytime

Today: AWS only. Coming next: Azure and other major clouds.