aws-vault

command module
Version: v2.0.1+incompatible Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Sep 3, 2015 License: MIT Imports: 15 Imported by: 0

README

AWS Vault

Securely store and access credentials for AWS. AWS Vault stores IAM credentials in your operating systems secure keystore and then generates temporary credentials from those to expose to your shell and applications. It's designed to be complementary to the aws cli tools, and is aware of your profiles and configuration in ~/.aws/config.

Currently OSX and Keychain are supported, with support for Linux and Windows planned.

Installing

Download the latest release. The OSX release is code-signed, and you can verify this with codesign -dvvv aws-vault.

Usage


# make use of the default profile
$ aws-vault add default
Enter Access Key Id: ABDCDEFDASDASF
Enter Secret Key: %

$ aws-vault exec default -- env | grep AWS
AWS_ACCESS_KEY_ID=asdasd
AWS_SECRET_ACCESS_KEY=aasdasdasda
AWS_SESSION_TOKEN=aslksdjlskdhlskdjflkj%lskdjfsl

# add an extra profile
$ aws-vault add work
Enter Access Key Id: ABDCDEFDASDASF
Enter Secret Key: %

$ aws-vault exec work -- env | grep AWS
AWS_ACCESS_KEY_ID=asdasd
AWS_SECRET_ACCESS_KEY=aasdasdasda
AWS_SESSION_TOKEN=aslksdjlskdhlskdjflkj%lskdjfsl

Security

Notice in the above how a session token gets written out. This is because aws-vault uses Amazon's STS service to generate temporary credentials. These expire in a short period of time, so the risk of leaking credentials is reduced.

Assuming Roles

Best-practice is to have a read-only account that you use on a day-to-day basis, and then use IAM roles to assume temporary admin privileges along with an MFA.

First you'll need to setup an MFA token in the AWS Console and create a role with admin access.

Edit your ~/.aws/config to add the role_arn and MFA serial number into a new profile:

[profile read-only]
region=us-east-1

[profile admin]
mfa_serial = arn:aws:iam::123456789012:mfa/jonsmith
source_profile = read-only
role_arn = arn:aws:iam::123456789012:role/admin-access

Then when you use the admin profile, aws-vault will look in the read-only profile's keychain for credentials and then use those credentials to assume the admin role. This assumed role is stored as a short duration session in your keychain so you will only have to enter MFA once per session.

Development

Developed with golang 1.5 with GO15VENDOREXPERIMENT=1, to install:

export GO15VENDOREXPERIMENT=1
go get github.com/99designs/aws-vault

References and Inspiration

Documentation

The Go Gopher

There is no documentation for this package.

Directories

Path Synopsis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL