AWS Big Data Blog
Connect to Amazon Athena with federated identities using temporary credentials
UPDATE, March 2019: This blog post describes how to use a custom JDBC driver to connect to Athena with federated identities. Since its publish date, Athena has built similar functionality into a more recent release of the Athena JDBC driver. For more information, please review Enabling Federated Access to Athena API.
—————————
Many organizations have standardized on centralized user management, most commonly Microsoft Active Directory or LDAP. Access to AWS resources is no exception. Amazon Athena is a serverless query engine for data on Amazon S3 that is popular for quick and cost-effective queries of data in a data lake. To allow users or applications to access Athena, organizations are required to use an AWS access key and an access secret key from which appropriate policies are enforced. To maintain a consistent authorization model across, organizations must enable authentication and authorization for Athena by using federated users.
This blog post shows the process of enabling federated user access with the AWS Security Token Service (AWS STS). This approach lets you create temporary security credentials and provides them to trusted users for running queries in Athena.
Temporary security credentials in AWS STS
Temporary security credentials ensures that access keys to protected AWS resources are properly rotated. Therefore, potential security leaks can be caught and remedied. AWS STS generates these per-use temporary access keys.
Temporary security credentials work similar to the long-term access key credentials that your IAM users can use. However, temporary security credentials have the following differences:
- They are intended for short-term use only. You can configure these credentials to last from a few minutes to several hours, with a maximum of 12 hours. After they expire, AWS no longer recognizes them, or allows any kind of access from API requests made with them.
- They are not stored with the user. They are generated dynamically and provided to the user when requested. When or before they expire, the user can request new credentials, if they still have permissions to do so.
Common scenarios for federated access
The following common scenarios describe when your organization may require federated access to Athena:
- Running queries in Athena while using federation. Your group is required to run queries in Athena while federating into AWS using SAML with permissions stored in Active Directory.
- Enabling access across accounts to Athena for users in your organization. Users in your organization with access to one AWS account needs to run Athena queries in a different account.
- Enabling access to Athena for a data application. A data application deployed on an Amazon EC2 instance needs to run Athena queries via JDBC.
Athena as the query engine for your data lake on S3
Athena is an interactive query service that lets you analyze data directly in Amazon S3 by using standard SQL. You can access Athena by using JDBC and ODBC drivers, AWS SDK, or the Athena console.
Athena enables schema-on-read analytics to gain insights from structured or semi-structured datasets found in the data lake. A data lake is ubiquitous, scalable, and reliable storage that lets you consume all of your structured and unstructured data. Customers increasingly prefer a serverless approach to querying data in their data lake. Some benefits of using an Amazon S3 for a data lake include:
- The ability to efficiently consume and store any data, at any scale, at low cost.
- A single destination for searching and finding the relevant data.
- Analysis of the data in S3 through a unified set of tools.
Solution overview
The following sections describe how to enable the common scenarios introduced previously in this post. They show how to download, install, and configure SQL Workbench to run queries in Athena. Next, they show how to use AWS STS with a custom JDBC credentials provider to obtain temporary credentials for an authorized user. These credentials are passed to Athena’s JDBC driver, which enables SQL Workbench to run authorized queries.
As a reminder, the scenarios are:
- Running queries in Athena while using federation.
- Enabling access across accounts to Athena for users in your organization.
- Enabling access to Athena for a data application.
Walkthrough
This walkthrough uses a sample table created to query Amazon CloudFront logs. It demonstrates that proper access has been granted to Athena after each scenario. This walkthrough also assumes that you have a table for testing. For information about creating a table, see Getting Started with Amazon Athena.
Prerequisites for scenarios 1 and 2
- Download and install SQL Workbench.
- Download the Athena custom credentials provider .jar file to the same computer where SQL Workbench is installed.
Note: You can also compile the .jar file by using this Athena JDBC source code.
- Download the Amazon Athena JDBC driver to the same computer where SQL Workbench is installed.
- In SQL Workbench, open File, Connect window, Manage Drivers. Choose the Athena driver and add two libraries, Athena JDBC driver and the custom credentials provider by specifying the location where you downloaded them.
Scenario 1: SAML Federation with Active Directory
In this scenario, we use a SAML command line tool. It performs a SAML handshake with an identity provider, and then retrieves temporary security credentials from AWS STS. We then pass the obtained security credentials through a custom credentials provider to run queries in Athena.
Before You Begin
- Make sure you have followed the prerequisites for scenarios 1 and 2.
- Set up a SAML integration with ADFS. For information, see Enabling Federation to AWS Using Windows Active Directory, ADFS, and SAML 2.0.
- Add the following IAM policies to the ADFS-Production role:
- Set up federated AWS CLI For more information, see How to Implement a General Solution for Federated API/CLI Access Using SAML 2.0
Executing queries in Athena with a SAML federated user identity
- Run the federated AWS CLI script configured as part of the prerequisites. Log in using a valid user name and password, then choose the ADFS-Production role. As a result, your temporary access_key, secret_access_key and session_token are generated. They are stored in a “credentials” file under the [saml] profile that looks similar to the following:
- To enable running queries in Athena through SQL Workbench, configure an Athena connection as follows:
- Choose Extended Properties, and enter the properties as follows:
- Choose Test to verify that you can successfully connect to Athena.
- Run a query in SQL Workbench to verify that credentials are correctly applied.
Scenario 2: Cross-account access
In this scenario, you allow users in one AWS account, referred to as Account A to run Athena queries in a different account, called Account B.
To enable this configuration, use the CustomIAMRoleAssumptionCredentialsProvider custom credentials provider to retrieve the necessary credentials. By doing so, you can run Athena queries by using credentials from Account A in Account B. This is made possible by the cross-account roles, as shown in the following diagram:
Before You Begin
1. If you haven’t already done so, follow these prerequisites for scenarios 1 and 2.
- Use AWS CLI to define a role named AthenaCrossAccountRole in Account B, as follows:
Content of cross-account-trust.json file
- Attach the IAM policies, AmazonAthenaFullAccess and AmazonS3FullAccess, to the AthenaCrossAccountRole IAM role, as follows:
Executing Queries in Athena with Cross Account Role Federated User Identity
- Set up a new Athena database connection in SQLWorkbench, as shown in the following example:
- Choose Extended Properties, and enter the properties as shown in the following example. This example configures the AWS credentials of an IAM user from Account A (AccessKey, SecretKey, and Cross Account Role ARN).
- Choose Test to verify that you can successfully connect to Athena.
- Run a query in SQL Workbench to verify that credentials are correctly applied.
Scenario 3: Using EC2 Instance Profile Role
This scenario uses the Amazon EC2 instance profile role to retrieve temporary credentials. First, create the EC2AthenaInstanceProfileRole IAM role via AWS CLI, as shown in the following example:
Content of policy.json file
Attach the IAM policies, AmazonAthenaFullAccess and AmazonS3FullAccess, to the EC2AthenaInstanceProfileRole IAM role, as follows:
Before You Begin
- Launch the Amazon EC2 instance for Windows, then attach the InstanceProfile role created in the previous step:
2. Log in to your Windows instance using RDP.
3. Install Java 8 and download and install SQL Workbench.
4. Download the Athena JDBC driver.
Executing queries in Athena using an EC2 instance profile role
1. In SQL Workbench, open File, Connect window, Manage Drivers. Specify a path to the Athena JDBC driver that was previously downloaded, as shown in the following example.
- The instance credentials provider, InstanceProfileCredentialsProvider, is included with the Amazon Athena JDBC driver. In SQL Workbench, set up an Athena connection as follows:
- Choose Extended Properties, and enter the properties as follows:
- Choose Test to verify that you can successfully connect to Athena.
- Run a query in SQL Workbench to verify that credentials are correctly applied.
Conclusion
This post walked through three scenarios to enable trusted users to access Athena using temporary security credentials. First, we used SAML federation where user credentials were stored in Active Directory. Second, we used a custom credentials provider library to enable cross-account access. And third, we used an EC2 Instance Profile role to provide temporary credentials for users in our organization to access Athena.
These approaches ensure that access keys protecting AWS resources are not directly hardcoded in applications and can be easily revoked as needed. To achieve this, we used AWS STS to generate temporary per-use credentials.
The scenarios demonstrated in this post used SQL Workbench. However, they apply for all other uses of the JDBC driver with Amazon Athena. Additionally, when using AWS SDK with Athena, similar approaches also apply.
Happy querying!
Additional Reading
If you found this post useful, be sure to check out Top 10 Performance Tuning Tips for Amazon Athena, and Analyze and visualize your VPC network traffic using Amazon Kinesis and Amazon Athena.
About the Author
Nitin Wagh is a Solutions Architect with Amazon Web Services specializing in Big Data Analytics. He helps AWS customers develop distributed big data solutions using AWS technologies.