aws-missing-tools
aws-mfa
aws-missing-tools | aws-mfa | |
---|---|---|
2 | 5 | |
61 | 1,007 | |
- | - | |
0.0 | 0.0 | |
over 1 year ago | 9 months ago | |
Python | Python | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
aws-missing-tools
-
AWS SSM vs CodeDeploy for rollout of applications
I'm not exactly sure what you're asking. But, if you are using AMIs and an autoscaling group, all you need to do is to update the AMI (launch configuration) for your autoscaling group, and then run this script that I linked to above. This script will automatically gradually roll out and replace the instances that are on an autoscaling group.
aws-mfa
-
Script or software that automatically populate specific profile in ~/.aws/credentials
I will tell you that some tools like sceptre and terraform barf using a profile with mfa like this and I ended up using aws-mfa: https://github.com/broamski/aws-mfa and run this for example to create a "dynamic" runamok-power profile:
-
Authenticating to AWS provider
I use MFA so store a long term key that is used to generate a temporary key. I use this tool to do the mfa: https://github.com/broamski/aws-mfa
-
Lockdown AWS API calls to list of IPs
I too, struggled with aws-vault and eventually gave up and use https://github.com/broamski/aws-mfa. If you want to take it one step further you can use oathtool and store the totp key in the encrypted vault of your choice. That is still MFA but if you store the factors on the same system you will need to decide about that risk before going the oathtool route.
-
Amazon Web Service account hacked. Email changed and charged over 10k USD. PLEASE HELP
The built in CLI MFA solution sucks if you have a workflow that relies on named profiles. We use them heavily at work and implemented aws-mfa to make it so that all of our stuff could work without adopting ridiculous workflows.
- Can somebody ELI5 how to setup MFA in the CLI?
What are some alternatives?
AirIAM - Least privilege AWS IAM Terraformer
pyotp - Python One-Time Password Library
privacyIDEA - :closed_lock_with_key: multi factor authentication system (2FA, MFA, OTP Server)
aws-runas - aws-runas rewritten in Go
one-time - One Time Password (TOTP and HOTP) library for Clojure. TOTP/HOTP is widely used for Two Factor / Multi Factor Authentication.
ecs-deploy - Powerful CLI tool to simplify Amazon ECS deployments, rollbacks & scaling
awsume - A utility for easily assuming AWS IAM roles from the command line.
sceptre - Build better AWS infrastructure
gimme-aws-creds - A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials
aws-okta - aws-vault like tool for Okta authentication
aws-vault - A vault for securely storing and accessing AWS credentials in development environments
saml2aws - CLI tool which enables you to login and retrieve AWS temporary credentials using a SAML IDP