Skip to main content

Security Assertion Markup Language (SAML) for Amazon.

Project description


Access to the AWS Management Console and AWS API for my Active Directory users using federation (AD FS 2). Use Keyring tool for store password.

Main features

  • Support AD FS 2 and AD FS 4
  • Allow to login to AWS Console
  • ALlow to generate AWS Access Key




pip3 install awssaml

Configuration file

All configuration is stored in ~/.aws/config file.

Basic configuration

identity_url =
region = eu-west-1
adfs_connection = ntlm

Advanced samlapi configuration

Use different ADFS connection methods
  • ntlm - Use NTLM authentication (default)
  • web_form - Use web form authentication
Set default username
username = [SAML User]

Default session duration

Setup 12 hours (it's 43200 seconds):

session_duration = 43200

Advanced profile configuration

You can setup custom profiles to reuse. Sample configuration entry for profile:

[profile nonprod-application1]
role_arn = arn:aws:iam::[ID]:role/[role]
principal_arn = arn:aws:iam::[ID]:saml-provider/[provider]
source_profile = nonprod
session_duration = 43200


> awssaml api nonprod-application1
> awssaml console nonprod-application1


Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Built Distribution

awssaml-1.0.0-py2.py3-none-any.whl (14.9 kB view hashes)

Uploaded py2 py3

Supported by

AWS AWS Cloud computing Datadog Datadog Monitoring Facebook / Instagram Facebook / Instagram PSF Sponsor Fastly Fastly CDN Google Google Object Storage and Download Analytics Huawei Huawei PSF Sponsor Microsoft Microsoft PSF Sponsor NVIDIA NVIDIA PSF Sponsor Pingdom Pingdom Monitoring Salesforce Salesforce PSF Sponsor Sentry Sentry Error logging StatusPage StatusPage Status page