A command line utility to generate temporary AWS credentials with virtual MFA device. Credentials could be exported into new shell or inserted into aws credentials file.
Github Release page provides binaries for:
Generate session credentials with default profile, and print the credentials as exported environment variables
sh
aws-mfa-session --code 123456 -e
Could be used to inject variables into the current shell
sh
eval $(aws-mfa-session -c 464899 -e)
Generate session credentials with default profile and MFA arn:
sh
aws-mfa-session --arn arn:aws:iam::012345678910:mfa/username --code 123456 -e
Generate session credentials with default profile and non-default region:
sh
aws-mfa-session --region us-east2 --code 123456 -e
Generate session credentials with default profile, and run a new shell with new shell with exported environment variables
sh
aws-mfa-session --code 123456 -s
Generate session credentials with default profile, and create or update a new profile:
sh
aws-mfa-session --update-profile mfa-session --code 123456
Generate session credentials with defined profile, and create or update a new profile:
sh
aws-mfa-session --profile dev --update-profile mfa-session --code 123456
Generate session credentials with defined profile and non-default credential file, and create or update a new profile:
sh
aws-mfa-session --credentials-file .aws/credentials2 --profile dev --update-profile mfa-session --code 123456
Requirements: rust and cargo
```sh
cargo build --release
cargo install
cargo install --git https://github.com/AnderEnder/aws-mfa-session
cargo install aws-mfa-session ```