This tool automates Multi-Factor Authentication (MFA) process in using awscli. It generates one time password, gets session token of AWS STS and updates AWS Credential file to use awscli with authenticated credentials.
You can install awsmfa via cargo install
command.
$ cargo install awsmfa
Or download the binary file from the release page.
First, create config file mfa_config.yml
in ~/.aws
directory like this.
devices:
- profile: default
arn: arn:aws:iam::123456788990:mfa/kaicoh
secret: ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ01
- profile: alpha
arn: arn:aws:iam::123456788990:mfa/alpha
secret: ZYXWVUTSRQPONMLKJIHGFECDBA9876543210ZYXWVUTSRQPONMLKJIHGFECDBA98
You can get the secret for each MFA device from the following screen in the registration process of the MFA device. If you want MFA code in registration process, you can get it via otp subcommand.
Execute the binary and the new credentials are saved as [profile]-mfa
in AWS Credentials (~/.aws/credentials
).
$ awsmfa --profile alpha --duration 43200
Saved credentials successfully as profile "alpha-mfa".
The new credentials is valid until 2023-01-31 09:00:00.
| long | short | requried | description
----|---- |---- |----
| profile | p | no | The profile name to execute aws-sts get-session-token
action. When not provided the default
is used.
| duration | d | no | The duration seconds the generated credentials persists.
$ aws s3 ls --profile alpha-mfa
...
Once you configure the config file, you can generate MFA code(= one time password) from this command.
$ awsmfa otp --profile alpha --clip
123456
| long | short | requried | description
----|---- |---- |----
| profile | p | no | The profile name in the config file. When not provided the default
is used.
| clip | c | no | Whether copying the generated MFA code to the clipboad or not.
Show the current configuration from the config file.
``` $ awsmfa ls [profile default] arn : arn:aws:iam::123456788990:mfa/kaicoh secret : ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ01
[profile alpha] arn : arn:aws:iam::123456788990:mfa/alpha secret : ZYXWVUTSRQPONMLKJIHGFECDBA9876543210ZYXWVUTSRQPONMLKJIHGFECDBA98 ```
Set the MFA device to the config file.
``` $ awsmfa set \
--profile beta \ --arn arn:aws:iam::123456788990:mfa/beta \ --secret 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789ABCDEFGHIJKLMNOPQR Saved MFA device for profile "beta" successfully.
$ awsmfa ls [profile default] arn : arn:aws:iam::123456788990:mfa/kaicoh secret : ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ01
[profile alpha] arn : arn:aws:iam::123456788990:mfa/alpha secret : ZYXWVUTSRQPONMLKJIHGFECDBA9876543210ZYXWVUTSRQPONMLKJIHGFECDBA98
[profile beta] arn : arn:aws:iam::123456788990:mfa/beta secret : 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789ABCDEFGHIJKLMNOPQR ```
| long | short | requried | description ----|---- |---- |---- | profile | p | yes | The profile name in the config file. | arn | a | yes | The ARN for the MFA device. | secret | s | yes | The secret key for the MFA device.
Remove the MFA device from the config file.
$ awsmfa rm --profile beta
Removed the MFA device for profile "beta" successfully.
| long | short | requried | description ----|---- |---- |---- | profile | p | yes | The profile name in the config file.
This software is released under the MIT License.