Displaying 1 to 20 from 22 results

aws-mfa - Manage AWS MFA Security Credentials

  •    Python

aws-mfa makes it easy to manage your AWS SDK Security Credentials when Multi-Factor Authentication (MFA) is enforced on your AWS account. It automates the process of obtaining temporary credentials from the AWS Security Token Service and updating your AWS Credentials file (located at ~/.aws/credentials). Traditional methods of managing MFA-based credentials requires users to write their own bespoke scripts/wrappers to fetch temporary credentials from STS and often times manually update their AWS credentials file. short-term - A temporary set of credentials that are generated by AWS STS using your long-term credentials in combination with your MFA device serial number (either a hardware device serial number or virtual device ARN) and one time token code. Your short term credentials are the credentials that are actively utilized by the AWS SDK in use.

Security Foundation -- WCF based SSO


This project was started as a WCF based SSO solution that serves ASP.NET websites (through membership providers ) and other winform / web services. Then we realized that we need to bring in claim-based funcitionalities and make it work as our own identity foundation.

aws-sdk-smalltalk - AWS SDK for Smalltalk

  •    Smalltalk

The AWS SDK for Pharo Smalltalk enables Smalltalk developers to easily work with Amazon Web Services. You can get started in minutes using Metacello and FileTree.

assume-role - Easily assume AWS roles in your terminal.

  •    Go

This tool will request and set temporary credentials in your shell environment variables for a given role.Setup a profile for each role you would like to assume in ~/.aws/config.

awsprocesscreds - Process credential providers for AWS SDKs and Tools

  •    Python

A collection of process-based credential providers to be used with the AWS CLI and related tools.This will cache your credentials by default, which will allow you to run multiple commands without having to enter your password each time. You can disable the cache by specifying --no-cache.

iam-role-injector - Assumes an IAM role via awscli STS call, injecting temporary credentials into shell environment

  •    Shell

The IAM Role Injector is a tool for easily assuming an IAM Role with Multi-Factor Authentication (MFA). It manipulates environment variables to allow codebases already using AWS credentials to use IAM roles with minimal to no refactoring. In the same vein, the Role Injector can also be used to help users using the command line tools to assume a role. Calling the script with 'source' is required for the environment variables to persist past the runtime of the script.

mfaws - :lock: AWS multi-factor authentication for the CLI

  •    Go

Download the appropriate binary from the releases page, chmod +x, and drop it into your PATH. Note: Make sure your hardware clock is correct! Especially if dual booting. If your time is out of sync, your MFA attempts will fail and the codes oathtool generates will be wrong (if you use it).

sts - Simplify working with AWS STS credentials and MFA

  •    Go

Download the latest release for your OS and architecture from: https://github.com/jonhadfield/sts/releases. Note: In order to get temporary credentials, you must first provide your permanent credentials as detailed here.

terraform-aws-iam-assumed-roles - Terraform Module for Assumed Roles on AWS with IAM Groups Requiring MFA

  •    HCL

Terraform module to provision two IAM roles and two IAM groups for assuming the roles provided MFA is present, and add IAM users to the groups. To give a user administrator's access, add the user to the admin group.

prototype-active-directory-dotnet-web-ad-complex-org-utility - Web console, on-prem powershell, and SignalR, working in concert to facilitate complex organization user management and integration with Azure Active Directory

  •    Javascript

This code is made available as a sample to demonstrate a potential strategy for managing and integrating multiple disconnected directories with Azure Active Directory. It should be customized by your dev team or a partner, and should be reviewed before being deployed in a production scenario. As an end to end system, it should be considered ALPHA code. This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

aws-runas - Run commands or shell under an AWS IAM role

  •    Ruby

The problem: You manage AWS across several different roles and need to use tools outside of the regular aws-cli toolchain. If you are doing your own prompt customization based on aws-runas data and don't want the prompt modified, you can supply --skip-prompt to skip the prompt modification. The aforementioned integration functions will still be available to you however, which you can use in your own scripts.

aws-runas - aws-runas rewritten in Go

  •    Go

A friendly way to do AWS STS AssumeRole operations so you can perform AWS API actions using a particular set of permissions. Includes integration with roles requiring MFA authentication! Works off of profile names configured in the AWS SDK configuration file. The tool will cache the credentials retrieved from AWS in order to minimize API calls to AWS, as well as minimize the entry of MFA codes (for roles requiring MFA).

awsudo - A simple utility for executing cli commands with an assumed role.

  •    Shell

A simple utility for easily executing AWS cli commands with an assumed role. For more information about the motiviation behind developing this utility, please read our blog post Assuming roles in AWS with sudo-like agility.

concourse-sts-lambda - Lambda function for dynamic STS credentials in Concourse (using assumed roles)

  •    Go

Lambda function to rotate AWS credentials used by Concourse teams. See the terraform subdirectory for an example that should work (with minimal effort). Our CI/CD (in our case Concourse) needs AWS credentials to deploy Terraform templates. Since we are sharing workers between teams, the instance profile itself has no privileges. And so, we need to pass in credentials to the tasks which require them.

We have large collection of open source products. Follow the tags from Tag Cloud >>

Open source products are scattered around the web. Please provide information about the open source projects you own / you use. Add Projects.