Assume AWS IAM Roles using SAML.to in GitHub Actions
-
Updated
Jan 9, 2024 - TypeScript
Assume AWS IAM Roles using SAML.to in GitHub Actions
Random tools I've written to make life easier using AWS, namely aws-choose-profile and aws-mfa-login
Manage AWS API credentials using a SAML Identity Provider
Get a credential by AssumeRoleWithSAML for AWS CLI and SDK
Terraform Module for Assumed Roles on AWS with IAM Groups Requiring MFA
awsdo is a tool to do anything using AWS temporary credentials.
An experiment to ease the burden of AWS STS's assume role on a workstation.
awscredswrap uses temporary credentials for the specified iam role to set a shell environment variable or execute a command.
AWS commands easy to manipulate on terminal
Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy to an IAM role.
A tool to create a shell with AWS environment credentials set
assume-role: a CLI tool making it easy to assume IAM roles through an AWS Bastion account
Automatically export environment variables from AWS assume-role output
Add a description, image, and links to the assume-role topic page so that developers can more easily learn about it.
To associate your repository with the assume-role topic, visit your repo's landing page and select "manage topics."