Support MFA/Short term credentials when connecting to clusters #2721
Labels
desktop
Issues related to the desktop
EKS
Related to Amazon Elastic Kubernetes Service
enhancement
New feature or request
Is your feature request related to a problem? Please describe the impact that the lack of the feature requested is creating.
Currently, I use short term credentials generated by awsume to connect to my EKS clusters, with access based on IAM Roles. I haven't been able to get this working nicely though kubeconfig when I have multiple profiles (although if anyone has any suggestions I'm open to ideas)
Describe the solution you'd like
Allow the option for a pre-authentication command in the terminals that pop up when authenticating with AWS. When using awsume, this would put the appropriate aws credentials in environment variables that can be used by aws eks get-token. It would also prompt for an MFA code in the terminal window.
What users will benefit from this feature?
Only users of the desktop app - mainly cloud service users that have a MFA requirement for connecting to clusters, or anyone that needs to provide additional parameters before calling their provider (for example, proxy settings).
Are you able to implement this feature?
Yes, if someone can give me some pointers to where I should be looking to make a start
Additional context
Somewhat related to #2623, as each would need to be authenticated separately/would need different pre-auth commands based on profile. Perhaps a setting that instead of automatically attempting to connect to clusters, each will show a button that allows users to manually decide when they want to authenticate to a cluster? This would also prevent x MFA attempts when first booting the application if you have lots of clusters.
The text was updated successfully, but these errors were encountered: