A user would like to authenticate to a remote S3 bucket using IAM roles rather than access/secret keys.
Data Intelligence Cloud (all versions)
roles, aws, eks, bucket, auth, di , KBA , CA-DI-CP , Core Platform , Product Enhancement
About this pageThis is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).
Search for additional results
Visit SAP Support Portal's SAP Notes and KBA Search.