| Crates.io | aws-mfa |
| lib.rs | aws-mfa |
| version | 1.0.24 |
| created_at | 2022-08-31 18:40:56.646446+00 |
| updated_at | 2025-04-19 13:13:01.325164+00 |
| description | Authenticate to AWS with MFA 🔐 |
| homepage | |
| repository | https://github.com/jhandguy/aws-mfa |
| max_upload_size | |
| id | 655864 |
| size | 109,564 |
Authenticate to AWS with MFA 🔐
➜ aws-mfa
Authenticate to AWS with MFA 🔐
Usage: aws-mfa <COMMAND>
Commands:
file Authenticate to AWS with MFA using config and credentials files
env Authenticate to AWS with MFA using environment variables
help Print this message or the help of the given subcommand(s)
Options:
-h, --help Print help
-V, --version Print version
aws-mfa is published on crates.io and can be installed with
cargo install aws-mfa
or via homebrew-tap with
brew install jhandguy/tap/aws-mfa
or downloaded as binary from the releases page.
Add default region in ~/.aws/config:
[profile <profile_name>-noauth]
region = <aws_region>
[profile <profile_name>]
region = <aws_region>
Add basic credentials in ~/.aws/credentials:
[<profile_name>-noauth]
aws_access_key_id = <aws_access_key_id>
aws_secret_access_key = <aws_secret_access_key>
Note: make sure to add the
-noauthsuffix to the profile name
Run the aws-mfa file command:
aws-mfa file -p <profile_name> -c <mfa_code>
Check generated credentials in ~/.aws/credentials:
cat ~/.aws/credentials
[<profile_name>]
aws_access_key_id = <aws_access_key_id>
aws_secret_access_key = <aws_secret_access_key>
aws_session_token = <aws_session_token>
aws_session_expiration_timestamp = <aws_session_expiration_timestamp>
Export default region and basic credentials as environment variables:
export AWS_REGION=<aws_region>
export AWS_ACCESS_KEY_ID=<aws_access_key_id>
export AWS_SECRET_ACCESS_KEY=<aws_secret_access_key>
Eval the aws-mfa env command:
eval $(aws-mfa env -c <mfa_code>)
Check exported environment variables:
env | grep AWS_
AWS_REGION=<aws_region>
AWS_ACCESS_KEY_ID=<aws_access_key_id>
AWS_SECRET_ACCESS_KEY=<aws_secret_access_key>
AWS_SESSION_TOKEN=<aws_session_token>
AWS_SESSION_EXPIRATION_TIMESTAMP=<aws_session_expiration_timestamp>