aws-runas
aws-mfa
aws-runas | aws-mfa | |
---|---|---|
5 | 5 | |
86 | 1,007 | |
- | - | |
4.1 | 0.0 | |
14 days ago | 9 months ago | |
Go | Python | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
aws-runas
- How do you get CLI credentials for a federated role?
-
session manager vs plain old ssh
I use aws-runas, the 3.x versions have builtin support for using session manager with shell and port forwarding.
-
Forcing users to authenticate with MFA
I can't comment on your particular MFA policy issue, but you could consider adding aws-runas to your workflow. Although mostly written for assuming roles, I have used it with session tokens with much success. The logic to assume roles using MFA actually calls the get-session-token API under the covers so the session token credentials indicating MFA was used are leveraged to get the role credentials.
-
aws-runas - Make using IAM roles easier
Version 3.0 is available for download from Github: https://github.com/mmmorris1975/aws-runas/releases/latest
-
Problems using a profile with assumed role
Have you considered a tool like aws-runas? It makes these sort of interactions much easier, and in the coming major release it will support all of the different Assume Role mechanics (IAM, SAML, and Web Identity). It currently handles IAM and SAML.
aws-mfa
-
Script or software that automatically populate specific profile in ~/.aws/credentials
I will tell you that some tools like sceptre and terraform barf using a profile with mfa like this and I ended up using aws-mfa: https://github.com/broamski/aws-mfa and run this for example to create a "dynamic" runamok-power profile:
-
Authenticating to AWS provider
I use MFA so store a long term key that is used to generate a temporary key. I use this tool to do the mfa: https://github.com/broamski/aws-mfa
-
Lockdown AWS API calls to list of IPs
I too, struggled with aws-vault and eventually gave up and use https://github.com/broamski/aws-mfa. If you want to take it one step further you can use oathtool and store the totp key in the encrypted vault of your choice. That is still MFA but if you store the factors on the same system you will need to decide about that risk before going the oathtool route.
-
Amazon Web Service account hacked. Email changed and charged over 10k USD. PLEASE HELP
The built in CLI MFA solution sucks if you have a workflow that relies on named profiles. We use them heavily at work and implemented aws-mfa to make it so that all of our stuff could work without adopting ridiculous workflows.
- Can somebody ELI5 how to setup MFA in the CLI?
What are some alternatives?
gimme-aws-creds - A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials
pyotp - Python One-Time Password Library
saml2aws - CLI tool which enables you to login and retrieve AWS temporary credentials using a SAML IDP
privacyIDEA - :closed_lock_with_key: multi factor authentication system (2FA, MFA, OTP Server)
zitadel - ZITADEL - The best of Auth0 and Keycloak combined. Built for the serverless era.
one-time - One Time Password (TOTP and HOTP) library for Clojure. TOTP/HOTP is widely used for Two Factor / Multi Factor Authentication.
trackiam - A project to collate IAM actions, AWS APIs and managed policies from various public sources.
ecs-deploy - Powerful CLI tool to simplify Amazon ECS deployments, rollbacks & scaling
awsu - Enhanced account switching for AWS, supports Yubikey as MFA source
aws-missing-tools - Random tools I've written to make life easier using AWS, namely aws-choose-profile and aws-mfa-login
aws-vault - A vault for securely storing and accessing AWS credentials in development environments
awsume - A utility for easily assuming AWS IAM roles from the command line.