Skip to content

Conversation

@emanor-okta
Copy link
Contributor

This PR adds the ability to source multiple AWS Fed App Ids in the okta.yaml configuration file.

@monde
Copy link
Contributor

monde commented Feb 15, 2024

I'm going to close this one, I think equivalent behavior is in the v2.1.0 release

https://github.com/okta/okta-aws-cli?tab=readme-ov-file#configuration-by-profile-name

Configuration by profile name

Multiple okta-aws-cli configurations can be saved in the $HOME/.okta/okta.yaml
file and are keyed by AWS profile name in the awscli.profiles section. This
allows the operator to save many okta-aws-cli configurations in the okta.yaml.

$ okta-aws-cli web --profile staging

Example $HOME/.okta/okta.yaml

---
awscli:
  profiles:
    staging:
      oidc-client-id: "0osabc"
      org-domain: "org-stg.okata.com"
      aws-iam-idp: "arn:aws:iam::123:saml-provider/MyIdP"
      aws-iam-role: "arn:aws:iam::123:role/S3_Read"
      write-aws-credentials: true
      open-browser: true
    production:
      oidc-client-id: "0opabc"
      org-domain: "org-prd.okata.com"
      aws-iam-idp: "arn:aws:iam::456:saml-provider/MyIdP"
      aws-iam-role: "arn:aws:iam::456:role/S3_Read"
      write-aws-credentials: true
      open-browser: true

@monde monde closed this Feb 15, 2024
@monde monde reopened this Jun 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants