-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
MFA requirement on IAM role trust policies are not supported by iidy #112
Comments
Related issue upstream: aws/aws-sdk-js#1543 |
There's some code on another issue that points at a way to resolve the issue with a call to |
I'm working on a fix for this. We'll also need to cover |
James and I came up with a solution in #119. |
#119 has been merged so can test it out with MFA on developer laptops after cutting a new release. |
Another solution it to have the SDK prompt user for the MFA token as per aws/aws-sdk-js#2126 |
This is resolved. |
iidy does not support the functionality of MFA requirements on role assumptions (
--profile
in AWS CLI parlance). This is used to enforce role assumptions constraints when working with escalated IAM role privileges or working in a multi-account structure.will return an STS assume role error.
The text was updated successfully, but these errors were encountered: