Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CyberDuck to support AWS profiles #9992

Closed
cyberduck opened this issue Jun 27, 2017 · 1 comment
Closed

CyberDuck to support AWS profiles #9992

cyberduck opened this issue Jun 27, 2017 · 1 comment
Labels
duplicate feature s3 AWS S3 Protocol Implementation

Comments

@cyberduck
Copy link
Collaborator

961dcb7 created the issue

CyberDuck doesn't support assume role functionalities of AWS.

So it means that accessKeyID and accessToken from centralised authentication
account can't be used to access a bucket in a different account.

AWS Sdks and aws cli for example support profiles nicely and more and more programs does it too.
ex:

awscli -profile "accountprod"

awscli -profile "accountperf"

Would be awesome if you could include this functionality, its actually part of AWS best practises.
Basically , one checkbox to activate profile, and if checked, a new textbox to specify the profile that are usually stored in
.aws/credentials

example:

[default]
aws_access_key_id = AKIA....
aws_secret_access_key = 

[profileprod]
region=us-east-1
role_arn=arn:aws:iam::1234567890:role/cross-account-access
source_profile=default

[profileperf]
region=us-east-1
role_arn=arn:aws:iam::0987654321:role/cross-account-access
source_profile=default

[profiletest]
region=us-east-1
role_arn=arn:aws:iam::010203040506:role/cross-account-access
source_profile=default

Thanks a lot.

@cyberduck
Copy link
Collaborator Author

@dkocher commented

Duplicate for #8880.

@iterate-ch iterate-ch locked as resolved and limited conversation to collaborators Nov 26, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
duplicate feature s3 AWS S3 Protocol Implementation
Projects
None yet
Development

No branches or pull requests

1 participant