Skip to main content

SAML federated API access for AWS

Project description

As part of AWS Governance to enhance the security with the accounts and IAM users, Federated API access is recommended for AWS resources instead of hard-coded IAM AccessID and SecretKeys in the config file.

# Steps:

  • If this is the first time install of this python package, use below command:

    For Python2.x version, pip install awssamlpy2 For Python3.x version, pip install awssamlpy3

  • To upgrade this python package to latest version, use below command:

    For Python2.x version, pip install awssamlpy2 –upgrade For Python3.x version, pip install awssamlpy3 –upgrade

  • Create a ‘.awssaml.properties’ (~/.awssaml.properties) file under your user home directory like below -

    [UserProp] aws-region=us-east-1 aws-outputformat=json idpurl=https://<Your Company AWS SAML Domain>/adfs/ls/IdpInitiatedSignOn.aspx?loginToRp=urn:amazon:webservices

    Please refer to Mesh DOC-111675 for the idpurl

  • Create a ‘configure’ file under ~/.aws directory without providing the values for access and secret keys. Dont worry if haven’t yet; the package will automatically create one if this file is not present. You may just choose the output and region fields as per your need.

    [default] output = json region = us-east-1 aws_access_key_id = aws_secret_access_key =

  • We have taken care to package the required modules. But if there are any additional packages required, install the missing modules based on the error encountered like below:

    On Linux, pip install <module>

    Eg: pip install requests

    On Windows, easy_install <module>

    Eg: easy_install requests

  • Whenever you need SAML access to your AWS services, just the command:

    aws-saml

  • This does the following:

    • Verifies your ~/.aws/configure file to set the approriate region; OR creates one if its not present

      • Prompts the user for AD username/password and does SAML auth with our ADFS

        NOTE: Username has to be in the format <domain><networkID>

      • Based on SAML response, prompts the user to choose the roles available on AWS for that user

      • Then, stores the temporarily created credentials (using Amazon STS service) for the user in the ~/.aws/credentials file along with STS token

      • Use API calls to work on AWS resources

      • Sample API call used in the script is for listing the S3 buckets, which is in Boto2.x format

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distribution

awssamlpy3-1.0.8.3-py3-none-any.whl (6.2 kB view details)

Uploaded Python 3

File details

Details for the file awssamlpy3-1.0.8.3-py3-none-any.whl.

File metadata

  • Download URL: awssamlpy3-1.0.8.3-py3-none-any.whl
  • Upload date:
  • Size: 6.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.2.0 pkginfo/1.5.0.1 requests/2.24.0 setuptools/49.6.0 requests-toolbelt/0.9.1 tqdm/4.48.2 CPython/3.6.8

File hashes

Hashes for awssamlpy3-1.0.8.3-py3-none-any.whl
Algorithm Hash digest
SHA256 b32c24c469a7adc145372f472763695072832e3a39f84c48a75fc385f13824af
MD5 ce2d3639539c21e97ad65f9eeb60481b
BLAKE2b-256 aab6494240b82fc1d6ac125b10c86ad69565c3e4c0331beb02796f344b9c61bf

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page