
Authenticating with MFA when you run any AWS CLI commands as switched IAM roles
This post is an introduction for the awesome tool, swrole.
2020.04.06
この記事は公開されてから1年以上経過しています。情報が古い可能性がありますので、ご注意ください。
This post is an introduction for the awesome tool, swrole.
The situation is below.
- you have an IAM user on account A
- you have an IAM role on account B
- Switching roles from account A requires MFA
Getting Started
Installing
brew tap tilfin/aws
brew install swrole
Configuring Profiles
Configure your profiles in your ~/.aws/credentials like followings.
[default]
aws_access_key_id=XXXXXXXXXXXXXXX
aws_secret_access_key=YYYYYYYYYYYYYYYYYYYYYYYYYYYY
[accountB]
source_profile = default
role_arn = arn:aws:iam::xxxxxxxxxxxx:role/cm-takagi.kensuke
mfa_serial = arn:aws:iam::yyyyyyyyyyyy:mfa/cm-takagi.kensuke
Usage
swrole accountB
Then, type your temporary token generated by your (virtual)? device.
You are on a new bash process, if authentication is succeeded. Now, you can any commands requires auth with MFA.
yarn cdk diff
yarn cdk deploy
Thank you to create the great tool, tilfin!!