mfa-aws
aws-mfa
mfa-aws | aws-mfa | |
---|---|---|
1 | 5 | |
4 | 1,009 | |
- | - | |
10.0 | 0.0 | |
almost 2 years ago | 9 months ago | |
Python | Python | |
Apache License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
mfa-aws
-
Script or software that automatically populate specific profile in ~/.aws/credentials
I think https://github.com/theorlandog/mfa-aws will help. I only use it for MFA, but it also has assume-role functionality.
aws-mfa
-
Script or software that automatically populate specific profile in ~/.aws/credentials
I will tell you that some tools like sceptre and terraform barf using a profile with mfa like this and I ended up using aws-mfa: https://github.com/broamski/aws-mfa and run this for example to create a "dynamic" runamok-power profile:
-
Authenticating to AWS provider
I use MFA so store a long term key that is used to generate a temporary key. I use this tool to do the mfa: https://github.com/broamski/aws-mfa
-
Lockdown AWS API calls to list of IPs
I too, struggled with aws-vault and eventually gave up and use https://github.com/broamski/aws-mfa. If you want to take it one step further you can use oathtool and store the totp key in the encrypted vault of your choice. That is still MFA but if you store the factors on the same system you will need to decide about that risk before going the oathtool route.
-
Amazon Web Service account hacked. Email changed and charged over 10k USD. PLEASE HELP
The built in CLI MFA solution sucks if you have a workflow that relies on named profiles. We use them heavily at work and implemented aws-mfa to make it so that all of our stuff could work without adopting ridiculous workflows.
- Can somebody ELI5 how to setup MFA in the CLI?
What are some alternatives?
gimme-aws-creds - A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials
pyotp - Python One-Time Password Library
sceptre - Build better AWS infrastructure
privacyIDEA - :closed_lock_with_key: multi factor authentication system (2FA, MFA, OTP Server)
awsume - A utility for easily assuming AWS IAM roles from the command line.
aws-runas - aws-runas rewritten in Go
terraform-provider-aws - The AWS Provider enables Terraform to manage AWS resources.
one-time - One Time Password (TOTP and HOTP) library for Clojure. TOTP/HOTP is widely used for Two Factor / Multi Factor Authentication.
saml2aws - CLI tool which enables you to login and retrieve AWS temporary credentials using a SAML IDP
ecs-deploy - Powerful CLI tool to simplify Amazon ECS deployments, rollbacks & scaling
aws-missing-tools - Random tools I've written to make life easier using AWS, namely aws-choose-profile and aws-mfa-login