Regarding Unity Catalog Self Assume Capabilities
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-26-2024 02:57 AM
Hi Team,
Good Day!
Recently in a Credentials section under Catalog , we have to add the self assume capabilities in the IAM role right.. Is it only for the Roles associated with Unity Catalog or for all the roles?.
Thanks,
Gowtham
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-26-2024 03:43 AM
Hi @GowthamR,
I believe it's only for the roles associated with UC. I was going through this community post on including self-assume capabilities for AWS IAM roles and it's mentioned that this change does not affect storage credentials that are not created using IAM roles, and it should not affect those who are not using UC on AWS.
Moreover, to verify if a storage credential is correctly configured as self-assuming, follow Step 4: Validate the storage credential in the Unity Catalog AwsIamRole documentation.
Cheers!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-26-2024 11:57 PM
Hi @RiyazAli
Thank you for your response, Which means it is only for the roles associated with Unity Catalog and what if I have created a instance profile in Aws which will allow databricks to read data from s3 Or redshift, so when I add this instance profile in storage credentials and when I validate the configuration then it is showing as fail to assume the role. So from Jan 20th will this instance profile will stop working or it is for only associated with UC?.
Thanks,

