Skip to main content

Security Assertion Markup Language (SAML) for Amazon.

Project description


Access to the AWS Management Console and AWS API for my Active Directory users using federation (AD FS 2). Use Keyring tool for store password.

Main features

  • Support AD FS 2 and AD FS 4
  • Allow to login to AWS Console
  • ALlow to generate AWS Access Key




pip3 install awssaml

Configuration file

All configuration is stored in ~/.aws/config file.

Basic configuration

identity_url =
region = eu-west-1
adfs_connection = ntlm

Advanced samlapi configuration

Use different ADFS connection methods
  • ntlm - Use NTLM authentication (default)
  • web_form - Use web form authentication
Set default username
username = [SAML User]

Default session duration

Setup 12 hours (it's 43200 seconds):

session_duration = 43200

Advanced profile configuration

You can setup custom profiles to reuse. Sample configuration entry for profile:

[profile nonprod-application1]
role_arn = arn:aws:iam::[ID]:role/[role]
principal_arn = arn:aws:iam::[ID]:saml-provider/[provider]
source_profile = nonprod
session_duration = 43200


> awssaml api nonprod-application1
> awssaml console nonprod-application1


Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Files for awssaml, version 1.0.0
Filename, size File type Python version Upload date Hashes
Filename, size awssaml-1.0.0-py2.py3-none-any.whl (14.9 kB) File type Wheel Python version py2.py3 Upload date Hashes View

Supported by

Pingdom Pingdom Monitoring Google Google Object Storage and Download Analytics Sentry Sentry Error logging AWS AWS Cloud computing DataDog DataDog Monitoring Fastly Fastly CDN DigiCert DigiCert EV certificate StatusPage StatusPage Status page