Skip to content

Document AWS Bedrock IAM role setup for BYOLLM, including Oz cloud runs#92

Draft
IsaiahWitzke wants to merge 2 commits into
mainfrom
iw/docs-bedrock-oz-setup
Draft

Document AWS Bedrock IAM role setup for BYOLLM, including Oz cloud runs#92
IsaiahWitzke wants to merge 2 commits into
mainfrom
iw/docs-bedrock-oz-setup

Conversation

@IsaiahWitzke
Copy link
Copy Markdown
Contributor

Documents how enterprise AWS admins set up the IAM role + OIDC trust policy that lets Warp assume into their AWS account for AWS Bedrock inference. Companion to the Oz Bedrock plumbing on iw/add-aws-region-to-oz-runs in warp-server.

The previous BYOLLM page described a local AWS CLI session-credentials flow (aws login). This PR rewrites those sections to match how the warp client actually authenticates: short-lived credentials obtained via OIDC + sts:AssumeRoleWithWebIdentity. It also extends the docs to cover Oz cloud agent runs in addition to interactive terminal agents.

What's covered

  • Trust policy — Uses the OIDC provider for Warp's issuer host (app.warp.dev in prod, staging.warp.dev in staging), restricts sub to scoped_principal:<team-uid>/*, and requires aud to equal sts.amazonaws.com. The /* wildcard matches both the user and service_account actor types so a single role works for interactive terminal use, Oz cloud agent runs triggered by humans, and named-agent runs.
  • Minimum Bedrock permissions policybedrock:InvokeModel + bedrock:InvokeModelWithResponseStream against foundation models and inference profiles.
  • Drop-in AWS CLI script — Creates the trust policy file, the permissions policy file, the role, and attaches the inline policy.
  • Note on the full sub shapescoped_principal:<team-uid>/<actor-type>:<principal-uid> so admins who want to scope further (e.g. /user:* or /service_account:*) know how.
  • Auth-model cleanup — Replaced the "team members run aws login locally" prerequisite/step/troubleshooting wording with the role-assumption flow. Removed the caveat that "Cloud agents do not yet support BYOLLM routing."

Notes for reviewers

  • This re-introduces the trust-policy / permissions-policy / CLI-script content that was previously on a branch I had open, this time rebased onto the latest main (which had since been force-pushed and no longer contained those changes).
  • Marking as draft — keeping it parked until the server-side branch lands.

Warp conversation

Rewrite the BYOLLM auth section to describe the OIDC + role-assumption
flow that Warp actually uses for AWS Bedrock inference, and extend the
docs to cover Oz cloud agent runs in addition to interactive terminal
agents.

Highlights:
- Replace the local AWS CLI session-credentials path with a trust
  policy + permissions policy + AWS CLI setup script that admins
  follow once per team.
- Use scoped_principal:<team-uid>/* in the trust policy so a single
  role works for human-triggered interactive and cloud runs as well
  as named-agent service-account runs. Note the full sub claim shape
  so admins can scope further if they want.
- Update prerequisites, troubleshooting, and FAQ to match the new
  auth model.

Companion to the Oz Bedrock plumbing on
iw/add-aws-region-to-oz-runs in warp-server.

Co-Authored-By: Oz <oz-agent@warp.dev>
@cla-bot cla-bot Bot added the cla-signed label May 18, 2026
@vercel
Copy link
Copy Markdown

vercel Bot commented May 18, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
docs Ready Ready Preview, Comment May 18, 2026 3:51pm

Request Review

…z section

The team-wide trust policy (Step 2) is now scoped to
scoped_principal:<team-uid>/user:* for human team members. Named-agent
runs authenticate as service accounts, not users, so they need
separate handling.

Add a new top-level 'BYOLLM on Oz' section that covers the
named-agent flow:

- Explains the actor-type difference between human runs
  (user:<user-uid>) and named-agent runs
  (service_account:<service-account-uid>).
- Provides two patterns for authorizing named agents: a wildcard
  service_account:* for all team agents, or per-UID conditions for
  a subset.
- Documents how to find the team UID (Admin Panel) and named-agent
  UIDs (GET /api/v1/agent/identities or the Oz web app URL).
- Documents the per-agent inference_providers.aws override in the
  public API, including role_arn / region / disabled and the
  trust-policy implications.

Co-Authored-By: Oz <oz-agent@warp.dev>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant