-
Hello, Using the AWS cli, this assumption works correctly. But with Cyberduck, it looks like the credentials used are from cache, so chaining multiple roles does not look like it will work.
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
I assume you are using the S3 (Credentials from AWS Command Line Interface) profile to connect with credentials from AWS CLI 1. You should test with the current snapshot build for any improvement as we have refactored the authentication strategies for S3 which should now also properly refresh credentials from the AWS CLI cache when expired. Still using AWS SSO you will have to periodically run the SSO flow from the CLI with If you are unable to make this work at all, please attach a Debug log file. Footnotes
|
Beta Was this translation helpful? Give feedback.
I assume you are using the S3 (Credentials from AWS Command Line Interface) profile to connect with credentials from AWS CLI 1. You should test with the current snapshot build for any improvement as we have refactored the authentication strategies for S3 which should now also properly refresh credentials from the AWS CLI cache when expired.
Still using AWS SSO you will have to periodically run the SSO flow from the CLI with
aws sts get-caller-identity --profile
. This is an open issue 2 that we have been unable to resolve with [^3] as AWS SSO (AWS IAM Identity Center) does not have proper support for OpenID Connect [^4].If you are unable to make this work at all, please attach a Debug log …