SAML Assertion to AWS STS Assumption
Assumes an STS role and produces usable session credentials for CLI tools from an intercepted SAML assertion
Overview
What is SAML Assertion to AWS STS Assumption?
Assumes an STS role and produces usable session credentials for CLI tools from an intercepted SAML assertion.
SCREENSHOT
SUMMARY
This extension allows you to extract credentials from a federated AWS console login so that you can use command line tools like terraform or AWSCLI.
For organisations using their corporate directory to control access to AWS console, this extension is essential to allow you to securely access AWS APIs with time based sessions without risking storing usernames and passwords.
Multiple accounts are supported, allowing you to use profile environment variables and command line parameters to access any account you are signed into.
Usage is simple - just sign into the console through your corporate directory and your temporary credentials will be saved to disk ready for use.
See More
Stats
Trends for SAML Assertion to AWS STS Assumption:
Rank
User count
Category Rank
Rating
Download
HOW TO INSTALL SAML Assertion to AWS STS Assumption FROM A CRX FILE
- Download SAML Assertion to AWS STS Assumption CRX file
- NOTE: Sometimes the browser may block downloading / installing CRX file from outside the Chrome Web Store. If so, you may need to download the ZIP file instead
- In the URL bar, go to chrome://extensions
- Enable Developer mode
Ratings
USER REVIEWS (0)
No reviews