Skip to content

Releases: Nike-Inc/gimme-aws-creds

v1.0.13

17 May 22:15
a2f2e4f
Compare
Choose a tag to compare
Merge pull request #58 from g0ddard/master

Adding configurable session timeout.  Issue #54.

v1.0.11

04 Apr 23:31
1af1f2f
Compare
Choose a tag to compare
  • If only one MFA factor exists, we automatically select that factor instead of prompting.
  • Added aws_security_token parameter to config and envars to enable support for boto2.x.
  • Enabled the ability to use the Okta app URL instead of an Okta API token.

v1.0.9

17 Nov 20:20
93806cc
Compare
Choose a tag to compare
Merge pull request #37 from epierce/master

Use custom User-Agent for requests to Okta

V1.0.0

05 Oct 19:28
Compare
Choose a tag to compare

To avoid sharing an Okta API key with a large number of people, I built a lambda in AWS that handles the interaction with Okta. The client authenticates with the lambda using OAuth, eliminating the need to share any private information with users. If you don't want to run the lambda and have access to an API key, calls to Okta can still be done directly in the client.

In addition, Okta MFA policies (both application and domain level) are now supported with the following factors:

Okta Verify (both push and OTP)
Google Authenticator
OTP via SMS
OTP via Voice call