Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add ability to source multiple AWS Fed Apps in okta.yaml #156

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

emanor-okta
Copy link
Contributor

This PR adds the ability to source multiple AWS Fed App Ids in the okta.yaml configuration file.

@monde
Copy link
Collaborator

monde commented Feb 15, 2024

I'm going to close this one, I think equivalent behavior is in the v2.1.0 release

https://github.com/okta/okta-aws-cli?tab=readme-ov-file#configuration-by-profile-name

Configuration by profile name

Multiple okta-aws-cli configurations can be saved in the $HOME/.okta/okta.yaml
file and are keyed by AWS profile name in the awscli.profiles section. This
allows the operator to save many okta-aws-cli configurations in the okta.yaml.

$ okta-aws-cli web --profile staging

Example $HOME/.okta/okta.yaml

---
awscli:
  profiles:
    staging:
      oidc-client-id: "0osabc"
      org-domain: "org-stg.okata.com"
      aws-iam-idp: "arn:aws:iam::123:saml-provider/MyIdP"
      aws-iam-role: "arn:aws:iam::123:role/S3_Read"
      write-aws-credentials: true
      open-browser: true
    production:
      oidc-client-id: "0opabc"
      org-domain: "org-prd.okata.com"
      aws-iam-idp: "arn:aws:iam::456:saml-provider/MyIdP"
      aws-iam-role: "arn:aws:iam::456:role/S3_Read"
      write-aws-credentials: true
      open-browser: true

@monde monde closed this Feb 15, 2024
@monde monde reopened this Jun 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants