[Cyberduck-trac] [Cyberduck] #9992: CyberDuck to support AWS profiles
Cyberduck
trac at cyberduck.io
Tue Jun 27 11:00:57 UTC 2017
#9992: CyberDuck to support AWS profiles
------------------------+-------------------
Reporter: raccoon | Owner:
Type: feature | Status: new
Priority: normal | Milestone:
Component: s3 | Version: 6.0.1
Severity: normal | Keywords:
Architecture: Intel | Platform:
------------------------+-------------------
CyberDuck doesn't support assume role functionalities of AWS.
So it means that accessKeyID and accessToken from centralised
authentication
account can't be used to access a bucket in a different account.
AWS Sdks and aws cli for example support profiles nicely and more and more
programs does it too.
ex:
awscli -profile "accountprod"
awscli -profile "accountperf"
Would be awesome if you could include this functionality, its actually
part of AWS best practises.
Basically , one checkbox to activate profile, and if checked, a new
textbox to specify the profile that are usually stored in
.aws/credentials
example:
[default]
aws_access_key_id = AKIA....
aws_secret_access_key =
[profileprod]
region=us-east-1
role_arn=arn:aws:iam::1234567890:role/cross-account-access
source_profile=default
[profileperf]
region=us-east-1
role_arn=arn:aws:iam::0987654321:role/cross-account-access
source_profile=default
[profiletest]
region=us-east-1
role_arn=arn:aws:iam::010203040506:role/cross-account-access
source_profile=default
Thanks a lot.
--
Ticket URL: <https://trac.cyberduck.io/ticket/9992>
Cyberduck <https://cyberduck.io>
Libre FTP, SFTP, WebDAV, S3 & OpenStack Swift browser for Mac and Windows
More information about the Cyberduck-trac
mailing list