Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for AWS profile with MFA (multifactor authentication) #60

Closed
deinspanjer opened this issue Feb 23, 2017 · 4 comments
Closed

Support for AWS profile with MFA (multifactor authentication) #60

deinspanjer opened this issue Feb 23, 2017 · 4 comments

Comments

@deinspanjer
Copy link
Contributor

I was trying to use the new aws.profile config setting, but I'm suspecting that awless doesn't yet support using a profile that requires the user to enter a MFA token?

@fxaguessy
Copy link
Contributor

fxaguessy commented Feb 28, 2017

This should be possible in the last version of awless. Could you please test with awless config set aws.profile mfaprofile in which mfaprofile is the profile that has been configured with MFA in ~/.aws/config ?

@deinspanjer
Copy link
Contributor Author

deinspanjer commented Mar 2, 2017

Thank you very much for looking into this!

I was able to get it to prompt and the command returned successfully after entering the MFA token code.

However, it doesn't appear to be caching/updating the credentials, unlike the normal aws cli, I have to enter a new token on every request which means I have to wait 30 seconds between each request as it is not allowed to reuse the same token.

@fxaguessy
Copy link
Contributor

As far as I know, caching credentials on disk is not yet possible in aws-go-sdk. That's why the credentials are not persisted across awless commands. We will investigate how we make this more usable.

@fxaguessy
Copy link
Contributor

See separated issue: #109 for the caching of STS credentials.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants