I have a requirement for a non AWS host to perform a scheduled scripted task with an S3 bucket. I have this working as expected with access/secret access keys related to the S3 role.
This non AWS host is running centos7 and I have it registered with AWS Systems Manager as a managed instance, I am hoping to assign the S3 role to the managed instance and use "aws sts assume-role --role-arn..." to retrieve temporary access keys but getting a "InvalidClientTokenId"
Should this work as expected or is there an alternative way to run the scheduled task on the SSM Managed instance without using fixed access/secret access keys?