SAML to AWS STS Keys Conversion SAML to AWS STS Keys Conversion

Developer Tools
Version: 3.3
Last Update: 2023-03-20

Overview

SAML to AWS STS Keys Conversion is a Chrome extension developed by prolane.org. According to the data from Chrome web store, current version of SAML to AWS STS Keys Conversion is 3.3, updated on 2023-03-20.
10,000+ users have installed this extension. 11 users have rated this extension with an average rating of .

Generates file with AWS STS Keys after logging in to AWS webconsole using SSO (SAML 2.0). It leverages 'assumeRoleWithSAML' API.

Google Chrome Extension which converts a SAML 2.0 assertion to AWS STS Keys (temporary credentials -> AccessKeyId, SecretAccessKey and SessionToken).

### Why this Chrome Extension? ###
If you don't have any user administration setup within AWS Identity & Access Management (IAM) but instead rely on your corporate user directory, i.e. Microsoft Active Directory. Your company uses a SAML 2.0 Identity Provider (IDP) to log in to the AWS Web Management Console (Single Sign On). Then this Chrome Estension if for you!

You run into trouble as soon as you would like to execute some fancy scripts from your computer which calls the AWS API's. When sending a request to the AWS API's you need credentials, meaning an AccessKey and SecretKey. You can easily generate these keys for each user in AWS IAM. However, since you don't have any users in AWS IAM and don't want to create users just for the sake of having an AccessKey and SecretKey you are screwed. But there is a way to get temporary credentials specifically for your corporate identity.

The Security Token Service (STS) from AWS provides an API action assumeRoleWithSAML. Using the SAML Assertion given by your IDP the Chrome Extension will call this API action to fetch temporary credentials. (AccessKeyId, SecretAccessKey and SessionToken). This way there is no need to create some sort of anonymous user in AWS IAM used for executing scripts. This would be a real security nightmare, since it won't be possible to audit who did what. This Chrome Extension however will make it super easy for you to just use your corporate identity for executing scripts calling AWS API's.

Rating

11 ratings

Total Installs

10,000+

Information

Last Update

2023-03-20

Current Version

3.3

Size

157KiB

Author

prolane.org

Website

None

Category

Developer Tools

Latest Reviews

See More

avatar Moh Basher
2021-05-07

Love it! If it doesn't work for you! Change the session timeout of your role to match or be more than the one you have on your identity provider

avatar Alexander Carlson
2020-09-21

Excellent!

avatar R W
2019-04-11

Best tool aout there for this, but no competition.

Would be good to see it write aws_session_expiration value into the credentials.

Even better if it could load an existing credentials file then update

avatar Jason Hutchinson
2019-03-17

As per @Leander's review. Very,very handy tool for federated access to AWS accounts when using the CLI!

avatar Leander Janssen
2016-07-25

Very handy extension when using SAML to login to your AWS account(s) and want to use the AWS CLI tools.