Skip to main content

Generate AWS access tokens from OIDC tokens

Last updated on

The AWS OIDC plugin lets you authenticate with AWS services using OIDC federation instead of long-lived access keys. This is useful in Harness CI pipelines running on Harness Cloud or self-hosted delegates where temporary credentials are preferred.

Prerequisites

  • An AWS IAM Role configured with a federated identity provider using OIDC.

  • OIDC configured in your AWS account (e.g., via IAM Identity Provider).

  • The pipeline must be running in a context where Harness can issue an OIDC token (e.g., on a hosted delegate with OIDC enabled).

  • The following feature flags must be enabled on your account. Contact Harness Support to enable them.

    • CI_SKIP_NON_EXPRESSION_EVALUATION (required)
    • CI_ENABLE_OUTPUT_SECRETS (required)
    • CI_ENABLE_PLUGIN_OUTPUT_SECRETS (required only if you use Harness Docker Runner infrastructure)

    These flags are required for the plugin to write temporary credentials as output secrets. If they are not enabled, credentials will not be available in subsequent steps.

  • This setup is supported on both Harness Cloud and Self-managed Kubernetes Infrastructure.

For more on configuring AWS for OIDC, refer to AWS OIDC setup.

Example Pipeline Usage

- step:
type: Plugin
name: assume-role-with-oidc
identifier: assume_role_with_oidc
spec:
image: plugins/aws-oidc
settings:
iamRoleArn: arn:aws:iam::123456789012:role/harness-ci-role
role_session_name: foo # defaults to harness-aws-oidc
duration: 3600 # in seconds

This step uses the injected OIDC token from Harness to authenticate with AWS and assume the specified role. The plugin writes the following temporary credentials as output variables:

  • AWS_ACCESS_KEY_ID
  • AWS_SECRET_ACCESS_KEY
  • AWS_SESSION_TOKEN
Important

The AWS OIDC plugin does not export credentials as plain environment variables that are automatically available in subsequent steps. Instead, it writes them as output secrets, which you must explicitly reference using Harness output variable expressions. If you attempt to use AWS_ACCESS_KEY_ID directly without mapping it through an output variable expression, the credentials will not be available and AWS API calls will fail with errors such as AuthorizationHeaderMalformed.

Inputs

KeyRequiredDescription
iamRoleArn✅ YesThe ARN of the AWS IAM role to assume via OIDC.
oidcTokenId✅ YesThe OIDC token to exchange for temporary AWS credentials.
roleSessionName❌ NoOptional name for the assumed role session. Defaults to harness-aws-oidc.
duration❌ NoOptional duration (in seconds) for temporary credentials.
logLevel❌ NoOptional log level (e.g. debug, info, warn).

Use AWS credentials in subsequent steps

To use the temporary AWS credentials in downstream steps, you must pass them explicitly using Harness output variable expressions in the step's envVariables configuration. Replace assume_role_with_oidc with the identifier of your AWS OIDC plugin step.

Example:

- step:
type: Run
name: Run AWS Command
identifier: runAwsCommand
spec:
image: amazon/aws-cli
shell: sh
envVariables:
AWS_ACCESS_KEY_ID: <+steps.assume_role_with_oidc.output.outputVariables.AWS_ACCESS_KEY_ID>
AWS_SECRET_ACCESS_KEY: <+steps.assume_role_with_oidc.output.outputVariables.AWS_SECRET_ACCESS_KEY>
AWS_SESSION_TOKEN: <+steps.assume_role_with_oidc.output.outputVariables.AWS_SESSION_TOKEN>
command: aws s3 ls

Troubleshooting

The following feature flags must be enabled for output secrets to work:

  1. CI_SKIP_NON_EXPRESSION_EVALUATION (required)
  2. CI_ENABLE_OUTPUT_SECRETS (required)
  3. CI_ENABLE_PLUGIN_OUTPUT_SECRETS (required only if you use Harness Docker Runner infrastructure)
tip

If AWS credentials appear empty or null in downstream steps (for example, AWS_ACCESS_KEY_ID resolves to an empty string), this is almost always caused by missing feature flags. Verify that CI_SKIP_NON_EXPRESSION_EVALUATION and CI_ENABLE_OUTPUT_SECRETS are both enabled on your account. If you are using Docker Runner, also confirm CI_ENABLE_PLUGIN_OUTPUT_SECRETS is enabled. Contact Harness Support before debugging IAM roles or trust policies.

AWS OIDC plugin GitHub Repo

Azure OIDC Token Plugin

GCP OIDC Token Plugin