Crates.io | aws-mfa |
lib.rs | aws-mfa |
version | |
source | src |
created_at | 2022-08-31 18:40:56.646446 |
updated_at | 2024-12-03 19:09:42.152203 |
description | Authenticate to AWS with MFA 🔐 |
homepage | |
repository | https://github.com/jhandguy/aws-mfa |
max_upload_size | |
id | 655864 |
Cargo.toml error: | TOML parse error at line 18, column 1 | 18 | autolib = false | ^^^^^^^ unknown field `autolib`, expected one of `name`, `version`, `edition`, `authors`, `description`, `readme`, `license`, `repository`, `homepage`, `documentation`, `build`, `resolver`, `links`, `default-run`, `default_dash_run`, `rust-version`, `rust_dash_version`, `rust_version`, `license-file`, `license_dash_file`, `license_file`, `licenseFile`, `license_capital_file`, `forced-target`, `forced_dash_target`, `autobins`, `autotests`, `autoexamples`, `autobenches`, `publish`, `metadata`, `keywords`, `categories`, `exclude`, `include` |
size | 0 |
Authenticate to AWS with MFA 🔐
➜ aws-mfa
Authenticate to AWS with MFA 🔐
Usage: aws-mfa <COMMAND>
Commands:
file Authenticate to AWS with MFA using config and credentials files
env Authenticate to AWS with MFA using environment variables
help Print this message or the help of the given subcommand(s)
Options:
-h, --help Print help
-V, --version Print version
aws-mfa is published on crates.io and can be installed with
cargo install aws-mfa
or via homebrew-tap with
brew install jhandguy/tap/aws-mfa
or downloaded as binary from the releases page.
Add default region in ~/.aws/config
:
[profile <profile_name>-noauth]
region = <aws_region>
[profile <profile_name>]
region = <aws_region>
Add basic credentials in ~/.aws/credentials
:
[<profile_name>-noauth]
aws_access_key_id = <aws_access_key_id>
aws_secret_access_key = <aws_secret_access_key>
Note: make sure to add the
-noauth
suffix to the profile name
Run the aws-mfa file
command:
aws-mfa file -p <profile_name> -c <mfa_code>
Check generated credentials in ~/.aws/credentials
:
cat ~/.aws/credentials
[<profile_name>]
aws_access_key_id = <aws_access_key_id>
aws_secret_access_key = <aws_secret_access_key>
aws_session_token = <aws_session_token>
aws_session_expiration_timestamp = <aws_session_expiration_timestamp>
Export default region and basic credentials as environment variables:
export AWS_REGION=<aws_region>
export AWS_ACCESS_KEY_ID=<aws_access_key_id>
export AWS_SECRET_ACCESS_KEY=<aws_secret_access_key>
Eval the aws-mfa env
command:
eval $(aws-mfa env -c <mfa_code>)
Check exported environment variables:
env | grep AWS_
AWS_REGION=<aws_region>
AWS_ACCESS_KEY_ID=<aws_access_key_id>
AWS_SECRET_ACCESS_KEY=<aws_secret_access_key>
AWS_SESSION_TOKEN=<aws_session_token>
AWS_SESSION_EXPIRATION_TIMESTAMP=<aws_session_expiration_timestamp>