[Cyberduck-trac] [Cyberduck] #8880: Authentication using AWS AssumeRole and GetSessionToken with AWS STS

Cyberduck trac at cyberduck.io
Wed Jul 18 14:00:39 UTC 2018


#8880: Authentication using AWS AssumeRole and GetSessionToken with AWS STS
----------------------------+-------------------------
 Reporter:  tigris          |         Owner:  dkocher
     Type:  feature         |        Status:  assigned
 Priority:  high            |     Milestone:  7.0
Component:  s3              |       Version:  4.7
 Severity:  normal          |    Resolution:
 Keywords:  s3 iam sts mfa  |  Architecture:  Intel
 Platform:  Mac OS X 10.10  |
----------------------------+-------------------------

Comment (by dkocher):

 Replying to [ticket:8880 tigris]:
 > It does support roles from an EC2 instance, so I think it should be very
 easy to support from my own OSX laptop? I was thinking of just running a
 local proxy for 169.254.169.254 to fake the fact I am not running on EC2,
 but it seemed like overkill.

 [https://github.com/99designs/aws-vault AWS Vault] looks like an
 interesting project which supports exposing credentials running a local
 EC2 ''Instance Metadata'' server which should work together with the
 [https://trac.cyberduck.io/wiki/help/en/howto/s3#ConnectingwithtemporaryaccesscredentialsTokenfromEC2
 profile] for ''Connecting with temporary access credentials (Token) from
 EC2''.

--
Ticket URL: <https://trac.cyberduck.io/ticket/8880#comment:42>
Cyberduck <https://cyberduck.io>
Libre FTP, SFTP, WebDAV, S3 & OpenStack Swift browser for Mac and Windows


More information about the Cyberduck-trac mailing list