-
Tiger authored
If the External ID can be manipulated, it is possible to impersonate a user that was has authenticated with AWS in the past but has since been deleted (which defeats the uniqueness constraint on role_external_id).
756bfbc8
If the External ID can be manipulated, it is possible to impersonate a user that was has authenticated with AWS in the past but has since been deleted (which defeats the uniqueness constraint on role_external_id).