aws-mfa makes it easy to manage your AWS SDK Security Credentials when Multi-Factor Authentication (MFA) is enforced on your AWS account. It automates the process of obtaining temporary credentials from the AWS Security Token Service and updating your AWS Credentials file (located at ~/.aws/credentials). Traditional methods of managing MFA-based credentials requires users to write their own bespoke scripts/wrappers to fetch temporary credentials from STS and often times manually update their AWS credentials file. short-term - A temporary set of credentials that are generated by AWS STS using your long-term credentials in combination with your MFA device serial number (either a hardware device serial number or virtual device ARN) and one time token code. Your short term credentials are the credentials that are actively utilized by the AWS SDK in use.
aws mfa 2fa two-factor-authentication multi-factor-authentication amazon-web-services aws-sts sts awsmfaThis project was started as a WCF based SSO solution that serves ASP.NET websites (through membership providers ) and other winform / web services. Then we realized that we need to bring in claim-based funcitionalities and make it work as our own identity foundation.
sso sts wcfA small utility to sign vanilla node.js http(s) request options using Amazon's AWS Signature Version 4.Can also be used in the browser.
amazon aws signature s3 ec2 autoscaling cloudformation elasticloadbalancing elb elasticbeanstalk cloudsearch dynamodb kinesis lambda glacier sqs sns iam sts ses swf storagegateway datapipeline directconnect redshift opsworks rds monitoring cloudtrail cloudfront codedeploy elasticache elasticmapreduce elastictranscoder emr cloudwatch mobileanalytics cognitoidentity cognitosync cognito containerservice ecs appstream keymanagementservice kms config cloudhsm route53 route53domains logsWARNING: aws2js is deprecated. Use aws-sdk instead. Amazon Web Services node.js module. Originally a fork of aws-lib.
amazon aws rest api https query-api ec2 rds ses elb s3 iam auto-scaling cloudwatch elasticache sqs simpledb sdb security-token-service sts dynamodb sns emr elastic-mapreduceThe AWS SDK for Pharo Smalltalk enables Smalltalk developers to easily work with Amazon Web Services. You can get started in minutes using Metacello and FileTree.
smalltalk aws dynamodb s3 sts pharo cloudfront elastictransciThis tool will request and set temporary credentials in your shell environment variables for a given role.Setup a profile for each role you would like to assume in ~/.aws/config.
aws iam-role stsA collection of process-based credential providers to be used with the AWS CLI and related tools.This will cache your credentials by default, which will allow you to run multiple commands without having to enter your password each time. You can disable the cache by specifying --no-cache.
aws aws-cli cloud credential-provider sts saml2 okta adfs iam iam-credentialsThe IAM Role Injector is a tool for easily assuming an IAM Role with Multi-Factor Authentication (MFA). It manipulates environment variables to allow codebases already using AWS credentials to use IAM roles with minimal to no refactoring. In the same vein, the Role Injector can also be used to help users using the command line tools to assume a role. Calling the script with 'source' is required for the environment variables to persist past the runtime of the script.
sts iam shellDownload the appropriate binary from the releases page, chmod +x, and drop it into your PATH. Note: Make sure your hardware clock is correct! Especially if dual booting. If your time is out of sync, your MFA attempts will fail and the codes oathtool generates will be wrong (if you use it).
aws mfa 2fa two-factor-authentication multi-factor-authentication amazon-web-services aws-sts sts awsmfa aws-mfaDownload the latest release for your OS and architecture from: https://github.com/jonhadfield/sts/releases. Note: In order to get temporary credentials, you must first provide your permanent credentials as detailed here.
sts iam security aws-sdk aws aws-cli cli mfa 2faTerraform module to provision two IAM roles and two IAM groups for assuming the roles provided MFA is present, and add IAM users to the groups. To give a user administrator's access, add the user to the admin group.
terraform terraform-modules aws iam-role sts mfa iam assume-roleThis code is made available as a sample to demonstrate a potential strategy for managing and integrating multiple disconnected directories with Azure Active Directory. It should be customized by your dev team or a partner, and should be reviewed before being deployed in a production scenario. As an end to end system, it should be considered ALPHA code. This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.
azure signalr active-directory azure-active-directory complex-org stsThe problem: You manage AWS across several different roles and need to use tools outside of the regular aws-cli toolchain. If you are doing your own prompt customization based on aws-runas data and don't want the prompt modified, you can supply --skip-prompt to skip the prompt modification. The aforementioned integration functions will still be available to you however, which you can use in your own scripts.
aws iam stsA friendly way to do AWS STS AssumeRole operations so you can perform AWS API actions using a particular set of permissions. Includes integration with roles requiring MFA authentication! Works off of profile names configured in the AWS SDK configuration file. The tool will cache the credentials retrieved from AWS in order to minimize API calls to AWS, as well as minimize the entry of MFA codes (for roles requiring MFA).
aws aws-runas iam sts mfaA simple utility for easily executing AWS cli commands with an assumed role. For more information about the motiviation behind developing this utility, please read our blog post Assuming roles in AWS with sudo-like agility.
aws awscli sudo sts assume assumerole stsassume stsassumerole role rolearn arn cli bashLocal and Windows Authentication, ASP.NET Core MVC, IdentityServer4
identityserver4 authentication authorization sts aspnetcore mvc windows-authenticationAn ASP.NET Core IdentityServer4 Identity Bootstrap 4 template with localization
identityserver4 identity sts aspnet-core mvc bootstrap4 localization 2faLambda function to rotate AWS credentials used by Concourse teams. See the terraform subdirectory for an example that should work (with minimal effort). Our CI/CD (in our case Concourse) needs AWS credentials to deploy Terraform templates. Since we are sharing workers between teams, the instance profile itself has no privileges. And so, we need to pass in credentials to the tasks which require them.
aws lambda concourse sts
We have large collection of open source products. Follow the tags from
Tag Cloud >>
Open source products are scattered around the web. Please provide information
about the open source projects you own / you use.
Add Projects.