-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Using an IAM Role with CLI + SSO #5933
Comments
Hi @ydogus, I think this should be documented here: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html#sso-configure-profile Under the section "Running a command with your AWS SSO enabled profile", I think this works through the scenario that you are describing.
|
Hello, Actually this is not what really I was looking for. I'm aware of named SSO profiles. But what I'm looking for is an equivalent of With So I was looking for a similar feature in CLI to simplify to work with assumed roles. For now I can't ask my CLI to make requests by assuming a role if my credentials are provided by SSO. Of course as a workaround I can use |
|
I'm kinda curious about this:
Does it work if you add
Then first login to the sso profile, but use the assume profile for other commands?
If that doesn't work, it seems to me like the SSO implementation would be incomplete, as far as support for the AWS Shared Config goes...? |
Thank you @lorengordon for the example. |
|
Thanks @lorengordon, that's the suggestion! Glad you got it working, @ydogus. |
It would be great if this use case was documented on this page: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html#sso-using-profile |
This was non-obvious, until I found aws/aws-cli#5933.
I'm a new AWS user and trying to follow this practice but got |
It would be nice to have some named profiles with SSO which are configured to assume roles: Something similar to
role_arn
property we use in CLI config file. This way we can have our CLI to assume the roles automatically after using SSO credentials to sign in to AWS services.I think it's a valid use case. We might still need to assume roles after signing over SSO.
I tried to use
role_arn
with SSO but it seems it is not working with SSO as it gives me an error ofPartial credentials found in assume-role, missing: source_profile or credential_source
.Is this already supported? If yes, can you please direct me to the documentation?
The text was updated successfully, but these errors were encountered: