You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 8, 2021. It is now read-only.
AWS CLI Version: (exec aws --version and aws-cli/1.16.13)
(describe your issue here)
I used the rpm method after uploading the ssk key to the IAM and verified the correct iam permission.
and configured the /etc/aws-ec2-ssh.conf
ASSUMEROLE='ec2 role that has the permission to get the ssh keys"
IAM_AUTHORIZED_GROUPs='the IAM group that users are in '
SUDOERS_GROUPS= "groupname"
still cannot ssh to the bastion by username
The text was updated successfully, but these errors were encountered:
Metadata:
aws --version
and aws-cli/1.16.13)(describe your issue here)
I used the rpm method after uploading the ssk key to the IAM and verified the correct iam permission.
and configured the /etc/aws-ec2-ssh.conf
ASSUMEROLE='ec2 role that has the permission to get the ssh keys"
IAM_AUTHORIZED_GROUPs='the IAM group that users are in '
SUDOERS_GROUPS= "groupname"
still cannot ssh to the bastion by username
The text was updated successfully, but these errors were encountered: