[Cyberduck-trac] [Cyberduck] #8880: Authentication using AWS AssumeRole and GetSessionToken with AWS STS

Cyberduck trac at cyberduck.io
Fri May 11 17:23:06 UTC 2018

#8880: Authentication using AWS AssumeRole and GetSessionToken with AWS STS
 Reporter:  tigris          |         Owner:  dkocher
     Type:  feature         |        Status:  assigned
 Priority:  high            |     Milestone:  7.0
Component:  s3              |       Version:  4.7
 Severity:  normal          |    Resolution:
 Keywords:  s3 iam sts mfa  |  Architecture:  Intel
 Platform:  Mac OS X 10.10  |

Comment (by dt1001):

 I already have a script that gets me this far in ~/.aws/credentials:

 output = json
 region = us-west-1
 aws_access_key_id = AAAAAAAAAAAAAAAAAAAA
 aws_session_token =

 I want to configure Cyberduck with just profile = "publish_profile" and
 have it use those three values. It would also be nice to catch any
 expiration error so you could remind the user that their session has
 expired and they need to run through their external SSO tool again to
 refresh the aws_session_token.

Ticket URL: <https://trac.cyberduck.io/ticket/8880#comment:40>
Cyberduck <https://cyberduck.io>
Libre FTP, SFTP, WebDAV, S3 & OpenStack Swift browser for Mac and Windows

More information about the Cyberduck-trac mailing list