You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 8, 2021. It is now read-only.
Have an option that enables a prompt for users to enter their AWS MFA Code before gaining access to the machine. This would be ideal to enable on a bastion host.
Draft Approach:
setup IAM roles/policies/groups for sts:AssumeRole call
After much research and several attempts, I've come to the conclusion that this isn't possible at this time in a secure fashion (which is the whole point of doing it). Feels like a 3rd party OTP provider is the way to go, for now.
Both AssumeRole & GetSessionToken both need access to long term Access keys which the instance doesn't have. You could create and store some locally. But that opens up lots of issues surrounding sudo users and the very strict Cannot exceed quota for AccessKeysPerUser: 2 error you'll run into.
I would love it if aws released a bastion ami that had this repo and mfa bundled, but I'm sure there is a reason they haven't already.
Let me know if you or anyone else thinks of a way that's worth trying.
Have an option that enables a prompt for users to enter their AWS MFA Code before gaining access to the machine. This would be ideal to enable on a bastion host.
Draft Approach:
sts:AssumeRole
callsts:AssumeRole
with captured tokenAWS_PAM=true
Research
IAM
Code
The text was updated successfully, but these errors were encountered: