-
Notifications
You must be signed in to change notification settings - Fork 127
Open
Description
At re:Invent 2022, AWS introduced SSO sessions for the AWS CLI, offering a simplified method for configuring SSO profiles.
AWS docs: Configuring IAM Identity Center authentication with the AWS CLI
Currently, the granted sso generate
and granted sso populate
commands still produce legacy SSO configurations, which is not optimal.
Legacy Configuration
[profile my-profile-alpha]
granted_sso_start_url = https://myorg.awsapps.com/start
granted_sso_region = us-east-1
granted_sso_account_id = 123456789012
granted_sso_role_name = AdministratorAccess
common_fate_generated_from = aws-sso
credential_process = aws-sso-util credential-process --profile my-profile-alpha
[profile my-profile-beta]
granted_sso_start_url = https://myorg.awsapps.com/start
granted_sso_region = us-east-1
granted_sso_account_id = 120987654321
granted_sso_role_name = AdministratorAccess
common_fate_generated_from = aws-sso
credential_process = aws-sso-util credential-process --profile my-profile-beta
Modern Configuration
[sso-session my-org]
granted_sso-start-url = https://myorg.awsapps.com/start
granted_sso-region = us-east-1
granted_sso-registration-scopes = sso:account:access
common_fate_generated_from = aws-sso
[profile my-profile-alpha]
granted_sso-session = my-org
granted_sso-account-id = 123456789012
granted_sso-role-name = AdministratorAccess
common_fate_generated_from = aws-sso
credential_process = aws-sso-util credential-process --profile my-profile-alpha
[profile my-profile-beta]
granted_sso-session = my-org
granted_sso-account-id = 120987654321
granted_sso-role-name = AdministratorAccess
common_fate_generated_from = aws-sso
credential_process = aws-sso-util credential-process --profile my-profile-beta
dgilman-hrp, tlauder-jobber and opncow
Metadata
Metadata
Assignees
Labels
No labels