aws-mfa
aws-okta
aws-mfa | aws-okta | |
---|---|---|
5 | 3 | |
1,009 | 520 | |
- | - | |
0.0 | 3.3 | |
9 months ago | over 3 years ago | |
Python | Go | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
aws-mfa
-
Script or software that automatically populate specific profile in ~/.aws/credentials
I will tell you that some tools like sceptre and terraform barf using a profile with mfa like this and I ended up using aws-mfa: https://github.com/broamski/aws-mfa and run this for example to create a "dynamic" runamok-power profile:
-
Authenticating to AWS provider
I use MFA so store a long term key that is used to generate a temporary key. I use this tool to do the mfa: https://github.com/broamski/aws-mfa
-
Lockdown AWS API calls to list of IPs
I too, struggled with aws-vault and eventually gave up and use https://github.com/broamski/aws-mfa. If you want to take it one step further you can use oathtool and store the totp key in the encrypted vault of your choice. That is still MFA but if you store the factors on the same system you will need to decide about that risk before going the oathtool route.
-
Amazon Web Service account hacked. Email changed and charged over 10k USD. PLEASE HELP
The built in CLI MFA solution sucks if you have a workflow that relies on named profiles. We use them heavily at work and implemented aws-mfa to make it so that all of our stuff could work without adopting ridiculous workflows.
- Can somebody ELI5 how to setup MFA in the CLI?
aws-okta
-
Authenticating to AWS provider
Could do external authentication like with Okta or some other SAML 2.0 provider, then get temporary keys that way. I've used https://github.com/segmentio/aws-okta to do that, but it's no longer maintained.
-
SHGA Shanghai Gov National Police Database Stolen
Depending on your IdP there's a few tools in addition to AWS CLI v2 that works well in this space.
aws-vault is one of them, though out of support now, aws-okta [1] is another.
[1] https://github.com/segmentio/aws-okta
-
How to Kill an AWS Access Key
Native integration to the AWS CLI, so no risks of open source project deprecation like what happened to us and aws-okta
What are some alternatives?
pyotp - Python One-Time Password Library
aws-vault - A vault for securely storing and accessing AWS credentials in development environments
privacyIDEA - :closed_lock_with_key: multi factor authentication system (2FA, MFA, OTP Server)
gitleaks - Protect and discover secrets using Gitleaks 🔑
aws-runas - aws-runas rewritten in Go
nitter - Alternative Twitter front-end
one-time - One Time Password (TOTP and HOTP) library for Clojure. TOTP/HOTP is widely used for Two Factor / Multi Factor Authentication.
pass-import - A pass extension for importing data from most existing password managers
ecs-deploy - Powerful CLI tool to simplify Amazon ECS deployments, rollbacks & scaling
hn-search - Hacker News Search
aws-missing-tools - Random tools I've written to make life easier using AWS, namely aws-choose-profile and aws-mfa-login
awsume - A utility for easily assuming AWS IAM roles from the command line.