Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for Session / Federation token credentials #123

Closed
jantman opened this issue Feb 14, 2016 · 2 comments
Closed

Support for Session / Federation token credentials #123

jantman opened this issue Feb 14, 2016 · 2 comments
Labels
Milestone

Comments

@jantman
Copy link
Owner

jantman commented Feb 14, 2016

One user ( #122 ) was trying to authenticate with a Session or a Federation token, i.e. with the data returned in a STS Credentials response.

If some organizations are using things like STS to give limited-duration leased credentials to their users, then it is probably a good idea for awslimitchecker to support these, so people can evaluate it without needing administrative approval.

@jantman jantman added this to the 0.4.0 milestone Feb 14, 2016
@jantman jantman modified the milestone: 0.4.0 Mar 8, 2016
@jantman jantman modified the milestone: future Oct 18, 2016
@jantman jantman added Docs and removed enhancement labels Feb 6, 2017
@jantman
Copy link
Owner Author

jantman commented Feb 6, 2017

Using 0.7.0, STS credentials work fine with awslimitchecker if I export the AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY and AWS_SESSION_TOKEN environment variables.

This just needs to be documented.

@jantman jantman modified the milestones: 0.8.0, future Feb 6, 2017
jantman added a commit that referenced this issue Mar 11, 2017
@jantman
Copy link
Owner Author

jantman commented Mar 11, 2017

This was just released in 0.8.0, which is now live on PyPI. Apologies for the long delay before this release.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant