Skip to main content

Terminal login toolkit for Amazon Web Services (AWS) enforcing and simplifying use of Multi-Factor Authentication (MFA).

Project description

Work secure using MFA according to best practices, and efficiently with AWS terminal tools like aws cli, aws-shell, terraform, etc.

Highly opinionated Amazon Web Services (AWS) terminal login toolkit, focused on enforcing and simplifying AWS Multi-Factor Authentication (MFA).

Written in Python 3, backwards compatible with Python 2, thanks to futures!

Currently being heavily tested in production against AWS multi-account setup (Well-Architected Framework) on macOS High Sierra.

Feels most at home using virtualenv, of course.

How it works:

  • Stores your AWS IAM credential profile in ~/.qrmr/credentials.ini;

  • Prompts for MFA OTP code;

  • Uses AWS STS to retrieve and store fresh SessionToken and temporary Access Key ID and Secret Access Key using your credential profile.

Near future:

  • Manage ~/.aws/credentials and ~/.aws/config files

  • Unit Tests :)

Because you probably just want to start using it:

Installation of QRMR:

pip install qrmr

Setup of AWS Credentials:

qrmr setup

Refreshing your SessionToken and temporary keys:

qrmr refresh

Be cool:

aws s3 ls

REMEMBER: set environment variable AWS_PROFILE in your shell or virtualenv to make life easier:

export AWS_PROFILE=iam_user_name

Find out more features by running:

qrmr --help

Find us on:


Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

qrmr-0.4.2.tar.gz (8.4 kB view hashes)

Uploaded source

Built Distribution

qrmr-0.4.2-py2.py3-none-any.whl (11.7 kB view hashes)

Uploaded py2 py3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page