Session credential provider for AWS SSO roles
Project description
aws-sso-credential-provider
Retrieves temporary credentials for programmatic access using AWS SSO roles.
Overview
So, you've decided to use AWS Single Sign-On to manage user authentication for multiple AWS accounts. Great idea! Now you can centrally manage user access permissions using the directory of your choosing. As a systems administrator, you're using AWS CLI version 2 with named profiles to interact with your accounts. Now your custom automation programs fail and are unable to locate credentials!
Named profiles configured for SSO are only usable by AWS CLIv2. That means your automation using boto3 or other AWS SDK clients fail authentication when referencing these profiles.
This python module solves that problem by retrieving AWS STS temporary security credentials for your chosen AWS SSO Role.
Installation
Requires installation of AWS CLI version 2 for SSO login support.
Requires configuration of (1) named profile per SSO directory credential. This profile can be configured with any account and role your SSO credentials provide access to. However, it is recommended you use the lowest permissioned role available. Example aws config file (~/.aws/config) profile:
[profile SSO_PROFILE]
sso_start_url = https://my-sso-portal.awsapps.com/start
sso_role_name = SSOReadOnlyRole
sso_region = us-east-1
sso_account_id = 123456789012
Use the package manager pip to install aws-sso-credential-provider.
pip install aws-sso-credential-provider
Detail
This python module uses the cached AWS SSO access token to retrieve STS short-term credentials for a specified role.
If the SSO access token is expired, the python module shells out to execute aws sso login --profile SSO_PROFILE
and renews the token.
Usage
# usage: python3 -m aws_sso [-h] -p PROFILE [-r ROLEARN] [-env | -ext | -d]
# optional arguments:
# -h, --help show this help message and exit
# -p PROFILE, --profile PROFILE
# Named profile for AWS SSO login
# -r ROLEARN, --rolearn ROLEARN
# RoleArn for session credentials
# -env, --env_vars Environment variable export strings to stdout
# -ext, --external-source
# Use as external credential provider, Requires --rolearn
# -d, --discover-roles Discover SSO roles and create external credential provider profiles in AWS_CONFIG_FILE
I want to use my AWS SDK programs with named profiles.
Use this python module as an external credential provider. It will supply your programs with temporary credentials for the SSO role.
The easiest way to configure this is to run the module in discovery mode.
python3 -m aws_sso -p SSO_PROFILE -d
Discovery mode will lookup all accounts and roles available to you using the SSO profile credentials you provided. It then creates or updates a named profile for each RoleARN found.
If you don't want to use discovery mode, you can edit your AWS config file (~/.aws/config) and add a named profile for each role that you want temporary credentials.
[profile ACCOUNTNUM-ROLENAME]
credential_process = python3 -m aws_sso -p SSO_PROFILE -r ROLEARN -ext
To test the named profiles, make a get-caller-identity call for each profile name and observe the Arn change in response.
aws sts get-caller-identity --profile ACCOUNTNUM-ROLENAME
I don't want to use named profiles.
If you don't want to use named profiles, you can load temporary security credentials into either the default credentials profile, or environment variables.
I want to interactively choose a role and load temporary security credentials into my default credentials profile.
Overwrites the default profile values in your AWS credentials file (~/.aws/credentials) for these three keys: aws_access_key_id, aws_secret_access_key, and aws_session_token.
python3 -m aws_sso -p SSO_PROFILE
Bypass the account and role chooser by specifying a ROLEARN.
python3 -m aws_sso -p SSO_PROFILE -r ROLEARN
Example AWS credentials file:
[default]
aws_access_key_id = ASIAXXXXXXXXXXXXXXXX
aws_secret_access_key = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
aws_session_token = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
I want to load temporary security credentials into my environment variables.
Environment variables are not available outside the current shell.
eval "$(python3 -m aws_sso -p SSO_PROFILE -r ROLEARN -env)"
Exports these environment variables:
export AWS_ACCESS_KEY_ID='ASIAXXXXXXXXXXXXXXXX'
export AWS_SECRET_ACCESS_KEY='xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx'
export AWS_SESSION_TOKEN='xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx'
Contributing
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change. Please make sure to update tests as appropriate.
License
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file aws-sso-credential-provider-1.0.0.tar.gz
.
File metadata
- Download URL: aws-sso-credential-provider-1.0.0.tar.gz
- Upload date:
- Size: 12.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.23.0 setuptools/41.2.0 requests-toolbelt/0.9.1 tqdm/4.46.0 CPython/3.8.2
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | d638228f8b04799118a19b42c80fa9d3d5ef04ba072dae6a150ee9fd61ac36d8 |
|
MD5 | 5263e35a9e84cbebe40412faf9130669 |
|
BLAKE2b-256 | 28776669bc1bd347107fd603cac2f61bd77210328928c698c71bab887fc3f7e6 |
File details
Details for the file aws_sso_credential_provider-1.0.0-py3-none-any.whl
.
File metadata
- Download URL: aws_sso_credential_provider-1.0.0-py3-none-any.whl
- Upload date:
- Size: 24.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.23.0 setuptools/41.2.0 requests-toolbelt/0.9.1 tqdm/4.46.0 CPython/3.8.2
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 5de654e9c190d7b21524f50308c5c0ce9827626e5f0522381012cb70f78bee91 |
|
MD5 | 3e7087f80adca0929d104dddafe31514 |
|
BLAKE2b-256 | cdc1c4bbdfda18fc024e80b85ed6419e1ccd1e2c5654c97ac8de5088ba0eca81 |