Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MFA requirement on IAM role trust policies are not supported by iidy #112

Closed
scottbrown opened this issue Jun 13, 2018 · 7 comments
Closed
Labels

Comments

@scottbrown
Copy link
Contributor

iidy does not support the functionality of MFA requirements on role assumptions (--profile in AWS CLI parlance). This is used to enforce role assumptions constraints when working with escalated IAM role privileges or working in a multi-account structure.

iidy ... --profile other-account

will return an STS assume role error.

@scottbrown scottbrown added the bug label Jun 13, 2018
@tavisrudd
Copy link
Collaborator

Related issue upstream: aws/aws-sdk-js#1543

@tavisrudd
Copy link
Collaborator

There's some code on another issue that points at a way to resolve the issue with a call to aws.SharedIniFileCredentials followed by aws.TemporaryCredentials aws/aws-sdk-js#1064

@tavisrudd
Copy link
Collaborator

I'm working on a fix for this. We'll also need to cover AssumeRoleArn, in which case the mfa serial number will need passing in as it won't be in ~/.aws/credentials.

@tavisrudd
Copy link
Collaborator

James and I came up with a solution in #119.

@tavisrudd
Copy link
Collaborator

#119 has been merged so can test it out with MFA on developer laptops after cutting a new release.

@jpb
Copy link
Contributor

jpb commented Jul 4, 2018

Another solution it to have the SDK prompt user for the MFA token as per aws/aws-sdk-js#2126

@tavisrudd
Copy link
Collaborator

This is resolved.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants