{{tag>aws cli 2fa mfa terminal}} ====== AWS CLI with 2FA ====== If 2FA is enabled on your AWS account, in order to use ''aws'' cli command from terminal you need to get the fresh credentials. First get the arn: aws iam list-mfa-devices --user-name meandmyself Then get the creds: aws sts get-session-token --serial-number arn-of-the-mfa-device --token-code code-from-token The //arn-of-the-mfa-device// is from the first command and //code-from-token// is just the 6-digit code from your 2FA app on your phone or somewhere. Then copy paste all of the fields in //~/.aws/credentials// file, but put it under a different profile since you stil need the non-expiration creds used in commands above. Example: antisa@antisa-XPS-13-9310:~$ aws iam list-mfa-devices { "MFADevices": [ { "UserName": "ante", "SerialNumber": "arn:aws:iam::xxxxxxxxxxxx:mfa/meandmyself", "EnableDate": "2024-05-09T11:50:38+00:00" } ] } antisa@antisa-XPS-13-9310:~$ aws sts get-session-token --serial-number arn:aws:iam::xxxxxxxxxx:mfa/meandmyself --token-code 123456 { "Credentials": { "AccessKeyId": "ASxxxxxxxxxxxx", "SecretAccessKey": "wBxxxxxxxxxxxxxxxxxxxxxxxx", "SessionToken": "IQoJb3xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", "Expiration": "2024-10-16T23:56:17+00:00" } } The format in //~/.aws/credentials// should be like: [myprofile-session] aws_access_key_id = xxxxxxxxxxxxxxxxxxx aws_secret_access_key = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx aws_session_token = IQoxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx Here's a bash script that adds the creds each time to the file. Just pass it token-code and add your serial number. Remember to source it e.g. . ~/.local/bin/aws_get_session.sh 1234 Or just use [[https://github.com/99designs/aws-vault|this]] #!/bin/bash # run this script with source (.) command since we need access to # the exported AWS_PROFILE variable below in the parent shell e.g. # . ~/.local/bin/aws_get_session.sh 1234 # debug # set -x if [ "${BASH_SOURCE[0]}" -ef "$0" ] then echo "Hey, you should source this script, not execute it!" echo "e.g. '. aws_get_session.sh 1234'" exit 1 fi if [ -z $1 ];then echo "You must provide 2FA token!" return 1 fi # colors On_Yellow='\033[43m' On_White='\033[47m' NC='\033[0m' # No Color echo "Deleting old creds..." sed -i '/\[myprofile-session\]/,+4d' ~/.aws/credentials echo "Creating new creds..." # use existing profile KST=$(AWS_PROFILE=myprofile aws sts get-session-token --serial-number arn:aws:iam::xxxxxxxxxxxxxx:mfa/meandmyself --token-code "$1") cat << EOF >> ~/.aws/credentials [myprofile-session] aws_access_key_id = $(echo "$KST" | jq '.Credentials.AccessKeyId' | tr -d '"') aws_secret_access_key = $(echo "$KST" | jq '.Credentials.SecretAccessKey' | tr -d '"') aws_session_token = $(echo "$KST" | jq '.Credentials.SessionToken' | tr -d '"') EOF # below export will only work when sourcing this script export AWS_PROFILE=myprofile-session echo -e "Current AWS_PROFILE set to ${On_Yellow}$AWS_PROFILE${NC}" ====== Tested on ====== * aws-cli/2.12.5 Python/3.11.4 Linux/6.8.0-45-generic exe/x86_64.ubuntu.22 prompt/off ====== See also ====== * [[wiki:aws_cli_commands|aws cli commands]] ====== References ====== * https://stackoverflow.com/questions/34795780/how-to-use-mfa-with-aws-cli * https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_use-resources.html