Sha256: 40fe52182ce1a5762daaf97a31d257375fcdfd654df61edf069c2b92667a825c
Contents?: true
Size: 1.49 KB
Versions: 1
Compression:
Stored size: 1.49 KB
Contents
 aws-sts ========== [](https://asciinema.org/a/324944) **The problem:** You want to be able to have short term credentials to your AWS account for security **The solution:** AWS STS and `aws-sts.rb` Features --------- This supports `~/.aws/config` making this tool easier to set-up. How it Works ------------- Roles are assumed, or session tokens are simply acquired (if `--no-role` is specified) via the [`AssumeRole`][assume-role] or the [`GetSessionToken`][get-session-token] AWS STS API calls. After this, your command or shell is launched with the standard AWS credential chain environment variables set: * `AWS_ACCESS_KEY_ID` * `AWS_SECRET_ACCESS_KEY` * `AWS_SESSION_TOKEN` Usage ------ Install the tool: 1. `gem install aws-sts` 2. `aws-sts <role>` Configuration --- Setup a profile for each role you'd like to use in your `~/.aws/config`. ```ini [profile account] region = eu-west-2 [profile dev] region = eu-north-1 role_arn = arn:aws:iam::1999:role/admin source_profile = account ``` And then in your `~/.aws/credentials` ```ini [account] aws_access_key_id=XXXXXX aws_secret_access_key=XXX ``` Usage --- ```bash $ ./aws-sts <role> export AWS_ACCESS_KEY_ID=SXXXX export AWS_SECRET_ACCESS_KEY=XXXX export AWS_SESSION_TOKEN=XXXX export ASSUMED_ROLE=dev # run eval $(ruby aws-sts.rb <profile>) ``` By default the credentials last for 3600 seconds or 1 hour.
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
aws-sts-0.1.0 | README.md |