Skip to content

Commit b199d7d

Browse files
authored
docs: update examples for secret tokens in data plane README (#493)
1 parent 0f4cf76 commit b199d7d

File tree

1 file changed

+7
-1
lines changed
  • extensions/data-plane/data-plane-aws-s3

1 file changed

+7
-1
lines changed

extensions/data-plane/data-plane-aws-s3/README.md

+7-1
Original file line numberDiff line numberDiff line change
@@ -54,16 +54,22 @@ possible values are:
5454
role.
5555
```json
5656
{
57+
"edctype": "dataspaceconnector:secrettoken",
5758
"accessKeyId": "<ACCESS_KEY_ID>",
5859
"secretAccessKey": "<SECRET_ACCESS_KEY>"
5960
}
6061
```
6162
- `AwsTemporatySecretToken`: Has a `sessionToken` in addition to the `accessKeyId` and `secretAccessKey`, it is
6263
typically
6364
referred to as AWS temporary security credentials. This process involves assuming an IAM role to obtain short-term
64-
credentials, which include an `accessKeyId`, `secretAccessKey`, and a session token.
65+
credentials, which include an `accessKeyId`, `secretAccessKey`, and a session token. In addition to these fields,
66+
the token expiration time, which is received together with the credentials upon assuming a role or otherwise
67+
requesting temporary credentials, has to be specified as a **unix timestamp**.
6568
```json
6669
{
70+
"edctype": "dataspaceconnector:secrettoken",
71+
"accessKeyId": "<ACCESS_KEY_ID>",
72+
"secretAccessKey": "<SECRET_ACCESS_KEY>",
6773
"sessionToken": "<SESSION_TOKEN>",
6874
"expiration": "<EXPIRATION>"
6975
}

0 commit comments

Comments
 (0)