Skip to content

Commit b8b6fe2

Browse files
author
Mike Morris
committed
update docs for option
1 parent 26ca98a commit b8b6fe2

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

docs/execution.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ Flags:
2525
-r, --refresh force a refresh of the cached credentials
2626
-v, --verbose print verbose/debug messages
2727
-M, --mfa-arn=MFA-ARN ARN of MFA device needed to perform Assume Role operation
28+
-o, --otp=OTP MFA token code
2829
-u, --update Check for updates to aws-runas
2930
-D, --diagnose Run diagnostics to gather info to troubleshoot issues
3031
--ec2 Run as mock EC2 metadata service to provide role credentials
@@ -159,3 +160,8 @@ export AWS_SESSION_TOKEN='zzzzz'
159160
Or simply `eval $(aws-runas -s)` to add these env vars in the current session. While this behavior is supported,
160161
it is certainly not the optimal way to use aws-runas, since you lose the ability to track when these credentials will
161162
expire and have aws-runas handle refreshing them.
163+
164+
### Using MFA
165+
For roles or API calls requiring successful MFA, the tool will prompt you to enter the current MFA code if the profile
166+
is configured with the `mfa_serial` attribute. Alternatively, you can supply the MFA token using the `-o` command line
167+
option (requires version 1.3.4 or higher)

0 commit comments

Comments
 (0)