[Cyberduck-trac] [Cyberduck] #8880: Authentication using AWS AssumeRole and GetSessionToken with AWS STS
Cyberduck
trac at cyberduck.io
Wed Jul 18 14:00:39 UTC 2018
#8880: Authentication using AWS AssumeRole and GetSessionToken with AWS STS
----------------------------+-------------------------
Reporter: tigris | Owner: dkocher
Type: feature | Status: assigned
Priority: high | Milestone: 7.0
Component: s3 | Version: 4.7
Severity: normal | Resolution:
Keywords: s3 iam sts mfa | Architecture: Intel
Platform: Mac OS X 10.10 |
----------------------------+-------------------------
Comment (by dkocher):
Replying to [ticket:8880 tigris]:
> It does support roles from an EC2 instance, so I think it should be very
easy to support from my own OSX laptop? I was thinking of just running a
local proxy for 169.254.169.254 to fake the fact I am not running on EC2,
but it seemed like overkill.
[https://github.com/99designs/aws-vault AWS Vault] looks like an
interesting project which supports exposing credentials running a local
EC2 ''Instance Metadata'' server which should work together with the
[https://trac.cyberduck.io/wiki/help/en/howto/s3#ConnectingwithtemporaryaccesscredentialsTokenfromEC2
profile] for ''Connecting with temporary access credentials (Token) from
EC2''.
--
Ticket URL: <https://trac.cyberduck.io/ticket/8880#comment:42>
Cyberduck <https://cyberduck.io>
Libre FTP, SFTP, WebDAV, S3 & OpenStack Swift browser for Mac and Windows
More information about the Cyberduck-trac
mailing list