saml2aws

CLI tool which enables you to login and retrieve AWS temporary credentials using a SAML IDP

MIT License

Downloads
1.2K
Stars
2.1K
Committers
223

Bot releases are hidden (Show)

saml2aws - v2.28.0

Published by wolfeidau over 3 years ago

  • #606 add support for USER and PASSWORD fields in pingfed provider
  • #605 send ""credentials are not expired"" to debug log
  • #604 modify page processor to work with action-less forms
  • #595 Adding Credential Process support during login
  • #593 Move login details validation to provider
  • #591 exclude default profile prompt
  • #590 Fetch credentials for multiple accounts with single login
  • #589 3.1.4 RC
  • #587 ADFS adding ChallengeQuestionAnswer input name
  • #585 Run all compiles with GHA
  • #584 Add compile to ci target
  • #583 Add linux/arm(64) targets to Makefile
  • #581 Bump Go to 1.15
  • #577 chore(ci) move to github actions
  • #576 fix(prompt) update survey library to fix bad input error
  • #575 documentation) README installation version bump
  • #574 Allow 401 response and handle refresh for Pingone
  • #573 update aad to account for mfa being skipped
  • #571 Fix getting destination URL
  • #567 Fix keycloak login when SAML response page contains input fields without 'name' attribute
saml2aws - v2.27.1

Published by wolfeidau about 4 years ago

  • Resolve unable to locate IDP oidc form submit URL error due to response body reuse #539
  • The roles from list-roles are output to stderr not stdout which is better for scripting #560
  • Updating broken URL for IDP Issues #553
  • Fail if Jumpcloud 401 does not prompt for MFA #556
  • Docs Update - Keep the CLI installation steps consistent #549
saml2aws - v2.27.0

Published by wolfeidau about 4 years ago

  • updated README.md for AzureAD doc #528
  • Modify case for handling mfa prompt. #529
  • Support SecurIDv2 Authentication (adfs2) #535
  • [Azure AD] Fixes #530: Supports KMSI page display logic after MFA #538
  • Keycloak follow redirect on 401 response #543
  • Issue 527: Duo MFA: pass new SID to subsequent API call to DuoSecurity (with backward compatibility) #532
  • Updated the AWS URN to match actual govCloud URN #534
  • feat(modules): refactor modules and tidy up some issues #544
saml2aws - v2.26.2

Published by wolfeidau over 4 years ago

saml2aws - v2.26.1

Published by wolfeidau over 4 years ago

saml2aws - v2.26.0

Published by wolfeidau over 4 years ago

  • [googleapps] Adding fallback when yubikey fails #470
  • fix script's template for fish #472
  • Added support for DUO authorized network bypass #458
  • Add support for Yubikey with Onelogin #461
  • fix script's template for powershell #484
  • Get the AWS destination from the Destination, not Audience #481
  • Fixes for okta + govcloud #476
  • Add console flag to present a link instead of opening browser directly #474
  • Fix use of OKTA (Okta verify TOTP) as an MFA provider setting #486
  • add Privileged authentication option in NetIQ #490
saml2aws - v2.25.0

Published by wolfeidau over 4 years ago

  • Feature: NetIQ provider #457
  • For Okta, optionally allow "--mfa-token" command-line argument. #454
  • Bring Go to 1.14 in Travis #465
  • missing cmdConsole.Flag into main.go for console function. #453
  • Feat/yubikey support for Okta Provider #456
  • Print roles immediately if only one role in SAML assertion #467
  • Feature: adds HTTP retry for all providers #463
saml2aws - v2.24.0

Published by wolfeidau over 4 years ago

  • FIX/AzureAD: Remove redundant WS call #435
  • Add support for new Google Login Page Formats #445
  • Removes call to open u2f device in googleapps #446
  • Set default to first item for role selection. #448
  • [provider][googleapps] - Add bgresponse=js_disabled #449
saml2aws - v2.23.0

Published by wolfeidau over 4 years ago

  • fix using exec-profile #422
  • Remove no longer in Dockerfile #431
  • Remove glide from Appveyor #432
  • feat(help) Add a note about debugging to missing assertion message #428
  • Increase waiting sleep for Okta Push to 3 seconds #430
  • Add support for AzureMfaServerAuthentication provider. #427
saml2aws - v2.22.1

Published by wolfeidau over 4 years ago

  • Export AWS_CREDENTIAL_EXPIRATION with token expiration #413
  • Removes call to open FIDO device in Okta #415
  • fix(console) Updated issuer to use correct value #420
  • fix(console) Refactor token / config checks to login correctly #412
saml2aws - v2.22.0

Published by wolfeidau over 4 years ago

  • feat(console) Log into the AWS console from saml2aws #410
saml2aws - v2.21.1

Published by wolfeidau over 4 years ago

  • chore(survey) Upgrade library which handles input to v2 #402
  • add Void Linux install instructions #338
  • fix(linting) Lots of little fixes with some better error handling #404
  • Allow passing MFA token for GoogleApps #406
  • Adds Google u2f support #398
  • Add support for Keycloak 8.0.1 theme with enabled OTP #397
saml2aws - v2.21.0

Published by wolfeidau almost 5 years ago

  • refactor ADFS provider to support AzureMFA as well #380
  • (readme) Linux installation notes #385
  • Fix Okta MFA regression issue #387
  • Added Akamai for command line idp-provider #391
  • fix aad Response did not contain a valid SAML assertion #381
  • OneLogin API credential is received as an argument during login #394
  • Adds WebAuthn support for Okta using U2F #389
  • Move from alsmola/go-u2fhost to marshallbrekka/go-u2fhost #396
saml2aws - v2.20.0

Published by wolfeidau almost 5 years ago

  • Update Okta provider to work with Keycloak as an IdP Proxy #376
  • Pass through session-duration flag for exec #379
  • Added Missing IDP Provider for Google Apps #377
saml2aws - v2.19.0

Published by wolfeidau almost 5 years ago

  • Fixes Okta MFA so that it works with TOTP #369
  • feat: prepend req url scheme and host to the startSAML "postUrl" #368
saml2aws - v2.18.0

Published by wolfeidau about 5 years ago

  • Fix fish env variable typo #354
  • Go Modules #347
  • Added Akamai EAA IdP support for saml2aws #355
  • Update exec to perform role assumption from profile. #362
  • Add disable-keychain option and implementation #361
  • Support China Region #357
  • Missing backticks (from README) #364
saml2aws - v2.17.0

Published by wolfeidau about 5 years ago

  • Add OneWaySMS MethodType to AzureAD provider #344
  • Fix to Support ADFS5 Form Format #343
  • Proposal to allow saml2aws exec against specific AWS profile #335
saml2aws - v2.16.0

Published by wolfeidau about 5 years ago

  • Try alternate Google 2FA method if primary isn't supported #321
  • login: check for empty AWS accounts in response #313
  • New Provider: AzureAD #325
saml2aws - v2.15.0

Published by wolfeidau over 5 years ago

saml2aws - v2.14.0

Published by wolfeidau over 5 years ago

  • #286
  • #298
  • #291
  • #297
  • #288
  • #287
  • #281
  • #280
  • #279
  • #275
  • #259
  • #277
  • #273
  • #270
  • #268
Package Rankings
Top 1.66% on Proxy.golang.org
Top 10.9% on Formulae.brew.sh
Badges
Extracted from project README
GitHub Actions status Build status - Windows codecov