AWS temporary keys fetcher - simple command-line tool to fetch temporary aws credentials and stores them in your configs so that third party that require actual access keys can work with them.
Project description
Fetching AWS IAM permissions
Introduction
Working with AWS, you typically has access to an ever-growing number of accounts and it is not advisable to create (IAM) users plus associated access keys in each of them.
Hence, you either work with AWS SSO, federated authentication, or you work with a central landing zone, and from there you assume roles in the account you want to work with.
However, some applications (in this case the Redshift JDBC driver) expects real access keys for a particular profile, in order to make use of temporary database credentials.
A well beloved tool for federated authentication does exist, but if you use native AWS authentication I couldn't find it.
This is a very simple tool that fetches temporary access keys for a particular profile and stores them in your ~/.aws/credentials file. So run the command, and refer to your profile (followed by -tmp
).
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for aws-tmp-keys-fetcher-0.0.1.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | e1ce8245675e5f484fef064021c48822c68d906d354aade1a02c240170f25bdd |
|
MD5 | 9c2a87c5e9c72acdfa2478c866d0fdb5 |
|
BLAKE2b-256 | c122eaacea3fdd77922318fe03b2e59de9531b72ab70d32935e847a0fe5c1626 |
Hashes for aws_tmp_keys_fetcher-0.0.1-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | b59225a7453b0f5770c447c8e20bfe626554b83e13eaf4938df1c5cb9a0a805b |
|
MD5 | 626b17b1dee4e166ef6a3489f7733e17 |
|
BLAKE2b-256 | 5288e00c6ed87f6dc235c09ff73fa4658693ca2954ea6184c8598b73c215d5cd |