Skip to main content

Acquire AWS STS (temporary) credentials via Google Apps SAML Single Sign On

Project description

# aws-google-auth

This command-line tool allows you to acquire AWS temporary (STS) credentials using Google Apps as a
federated (Single Sign-On, or SSO) provider.

## Setup

You'll first have to set up Google Apps as a SAML identity provider (IdP) for AWS. There are tasks to be
performed on both the Google Apps and the Amazon sides; these references should help you with those
configurations:

* [How to Set Up Federated Single Sign-On to AWS Using Google Apps](https://aws.amazon.com/blogs/security/how-to-set-up-federated-single-sign-on-to-aws-using-google-apps/)
* [Using Google Apps SAML SSO to do one-click login to
AWS](https://blog.faisalmisle.com/2015/11/using-google-apps-saml-sso-to-do-one-click-login-to-aws/)

If you need a fairly simple way to assign users to roles in AWS accounts, we have another tool called
[Google AWS Federator](https://github.com/cevoaustralia/google-aws-federator) that might help you.

### Important Data

You will need to know Google's assigned Identity Provider ID, and the ID that they
assign to the SAML service provider.

Once you've set up the SAML SSO relationship between Google and AWS, you can find the
SP ID by drilling into the Google Apps console, under `Apps > SAML Apps > Settings for
AWS SSO` -- the URL will include a component that looks like
`...#AppDetails:service=123456789012...` -- that number is `GOOGLE_SP_ID`

You can find the `GOOGLE_IDP_ID`, again from the admin console, via `Security > Set
up single sign-on (SSO)` -- the `SSO URL` includes a string like
`https://accounts.google.com/o/saml2/idp?idpid=aBcD01AbC` where the last bit (after
the `=`) is the IDP ID.

## Installation

You can install the python code locally, via `pip`:

```shell
localhost$ cd ..../aws-google-auth && pip install .
```

If you don't want to have the tool installed on your local system, or if you prefer to isolate changes,
there is a Dockerfile provided, which you can build with:

```shell
localhost$ cd ..../aws-google-auth && docker build -t aws-google-auth .
```

## Usage

1. Set environment variables for `GOOGLE_USERNAME`, `GOOGLE_IDP_ID`, and
`GOOGLE_SP_ID` (see above under "Important Data" for how to find the last two; the
first one is usually your email address)
1. For Docker: `docker run -it -e GOOGLE_USERNAME -e GOOGLE_IDP_ID -e GOOGLE_SP_ID
aws-google-auth`
1. For Python: `aws-google-auth`

You'll be prompted for your password and an MFA token, which you can get via Google
Authenticator, Authy, or other similar TOTP applications.

If you have more than one role available to you, you'll be prompted to choose the role
from a list; otherwise, if your credentials are correct, you'll just see the AWS keys
printed on stdout.

You should `eval` the `export` statements that come out, because that'll set
environment variables for you. This tools currently doesn't write credentials to an
`~/.aws/credentials` file

## Acknowledgements

This work is inspired by [keyme](https://github.com/wheniwork/keyme) -- their digging into the
guts of how Google SAML auth works is what's enabled it.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

aws-google-auth-0.0.1.tar.gz (6.9 kB view hashes)

Uploaded Source

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page