gimme-aws-creds
aws-mfa
gimme-aws-creds | aws-mfa | |
---|---|---|
5 | 5 | |
909 | 1,009 | |
0.9% | - | |
7.9 | 0.0 | |
5 days ago | 9 months ago | |
Python | Python | |
Apache License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
gimme-aws-creds
- Script or software that automatically populate specific profile in ~/.aws/credentials
-
Getting AWS CLI credentials through Okta SSO?
I got gimme-aws-creds (https://github.com/Nike-Inc/gimme-aws-creds) to authenticate via Okta - but no AWS roles are found in the SAML response. It works fine through the AWS console.
- How do you get CLI credentials for a federated role?
-
How to use AWS CLI with Okta?
Gimme creds works nicely: https://github.com/Nike-Inc/gimme-aws-creds
-
Securing AWS API credentials and access to AWS API
AWS has always lagged behind is offering reasonable native authentication options to its console and CLI. In order to support something like "yubikey" you need to go with another authentication and authorization provider such as Okta which provides support for a wide variety of MFA options. Then you can also use open source tooling such as https://github.com/Nike-Inc/gimme-aws-creds to grab temporary credentials. Okta is the one I'm most familiar but there are others out there as well.
aws-mfa
-
Script or software that automatically populate specific profile in ~/.aws/credentials
I will tell you that some tools like sceptre and terraform barf using a profile with mfa like this and I ended up using aws-mfa: https://github.com/broamski/aws-mfa and run this for example to create a "dynamic" runamok-power profile:
-
Authenticating to AWS provider
I use MFA so store a long term key that is used to generate a temporary key. I use this tool to do the mfa: https://github.com/broamski/aws-mfa
-
Lockdown AWS API calls to list of IPs
I too, struggled with aws-vault and eventually gave up and use https://github.com/broamski/aws-mfa. If you want to take it one step further you can use oathtool and store the totp key in the encrypted vault of your choice. That is still MFA but if you store the factors on the same system you will need to decide about that risk before going the oathtool route.
-
Amazon Web Service account hacked. Email changed and charged over 10k USD. PLEASE HELP
The built in CLI MFA solution sucks if you have a workflow that relies on named profiles. We use them heavily at work and implemented aws-mfa to make it so that all of our stuff could work without adopting ridiculous workflows.
- Can somebody ELI5 how to setup MFA in the CLI?
What are some alternatives?
saml2aws - CLI tool which enables you to login and retrieve AWS temporary credentials using a SAML IDP
pyotp - Python One-Time Password Library
aws-runas - aws-runas rewritten in Go
privacyIDEA - :closed_lock_with_key: multi factor authentication system (2FA, MFA, OTP Server)
okta-aws-cli-assume-role - Okta AWS CLI Assume Role Tool
sceptre - Build better AWS infrastructure
one-time - One Time Password (TOTP and HOTP) library for Clojure. TOTP/HOTP is widely used for Two Factor / Multi Factor Authentication.
awsume - A utility for easily assuming AWS IAM roles from the command line.
ecs-deploy - Powerful CLI tool to simplify Amazon ECS deployments, rollbacks & scaling
terraform-provider-aws - The AWS Provider enables Terraform to manage AWS resources.
aws-missing-tools - Random tools I've written to make life easier using AWS, namely aws-choose-profile and aws-mfa-login