SAML to AWS STS Keys Conversion
Generates file with AWS STS Keys after logging in to AWS webconsole using SSO (SAML 2.0). It leverages 'assumeRoleWithSAML' API.
什麼是SAML to AWS STS Keys Conversion?
SAML to AWS STS Keys Conversion是由prolane.org開發的Chrome擴展程式,該擴展的主要功能是“Generates file with AWS STS Keys after logging in to AWS webconsole using SSO (SAML 2.0). It leverages 'assumeRoleWithSAML' API.”。
擴展截圖
下載SAML to AWS STS Keys Conversion擴展crx文件
下載SAML to AWS STS Keys Conversion擴展crx格式的文件,手動將Chrome擴充功能安裝到瀏覽器中,也可以將crx文件分享給朋友,輕鬆安裝Chrome擴充功能。
擴展使用說明
Google Chrome Extension which converts a SAML 2.0 assertion to AWS STS Keys (temporary credentials -> AccessKeyId, SecretAccessKey and SessionToken). ### Why this Chrome Extension? ### If you don't have any user administration setup within AWS Identity & Access Management (IAM) but instead rely on your corporate user directory, i.e. Microsoft Active Directory. Your company uses a SAML 2.0 Identity Provider (IDP) to log in to the AWS Web Management Console (Single Sign On). Then this Chrome Estension if for you! You run into trouble as soon as you would like to execute some fancy scripts from your computer which calls the AWS API's. When sending a request to the AWS API's you need credentials, meaning an AccessKey and SecretKey. You can easily generate these keys for each user in AWS IAM. However, since you don't have any users in AWS IAM and don't want to create users just for the sake of having an AccessKey and SecretKey you are screwed. But there is a way to get temporary credentials specifically for your corporate identity. The Security Token Service (STS) from AWS provides an API action assumeRoleWithSAML. Using the SAML Assertion given by your IDP the Chrome Extension will call this API action to fetch temporary credentials. (AccessKeyId, SecretAccessKey and SessionToken). This way there is no need to create some sort of anonymous user in AWS IAM used for executing scripts. This would be a real security nightmare, since it won't be possible to audit who did what. This Chrome Extension however will make it super easy for you to just use your corporate identity for executing scripts calling AWS API's.
擴展基本資訊
名稱 | SAML to AWS STS Keys Conversion |
ID | ekniobabpcnfjgfbphhcolcinmnbehde |
官方網址 | https://chromewebstore.google.com/detail/saml-to-aws-sts-keys-conv/ekniobabpcnfjgfbphhcolcinmnbehde |
簡介 | Generates file with AWS STS Keys after logging in to AWS webconsole using SSO (SAML 2.0). It leverages 'assumeRoleWithSAML' API. |
檔案大小 | 157 KB |
安裝次數 | 14,091 |
目前版本 | 3.3 |
更新時間 | 2023-03-20 |
上架時間 | 2019-02-08 |
評分 | 3.90/5 共 10 次評分 |
開發者 | prolane.org |
電子郵箱 | [email protected] |
付費類型 | free |
擴展官網 | https://github.com/prolane/samltoawsstskeys |
支援的語言 | en |
manifest.json | |
{ "update_url": "https:\/\/clients2.google.com\/service\/update2\/crx", "manifest_version": 3, "author": "G.T.C. Laan (prolane.org)", "homepage_url": "https:\/\/github.com\/prolane\/samltoawsstskeys", "name": "SAML to AWS STS Keys Conversion", "description": "Generates file with AWS STS Keys after logging in to AWS webconsole using SSO (SAML 2.0). It leverages 'assumeRoleWithSAML' API.", "version": "3.3", "icons": { "16": "icons\/icon_16.png", "32": "icons\/icon_32.png", "48": "icons\/icon_48.png", "128": "icons\/icon_128.png" }, "action": { "default_icon": "icons\/icon_32.png", "default_popup": "popup\/popup.html" }, "background": { "service_worker": "background\/script.js" }, "options_page": "options\/options.html", "permissions": [ "webRequest", "storage", "downloads" ], "host_permissions": [ " |