Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Documentation to reflect new Multi-MFA per IAM User functionality on AWS. #1101

Merged
merged 5 commits into from
Feb 3, 2023

Conversation

LouisTsiattalou
Copy link
Contributor

See #1100

I've gotten AWS Vault to work using a Yubikey and a virtual TOTP device, using AWS' new feature for multiple MFA devices. I've updated the documentation to be consistent with this new capability, and have explained how to get both a Yubikey and a Virtual TOTP device working with the same IAM User.

Louis Tsiattalou added 4 commits December 22, 2022 14:31
…IAM_USERNAME`

Due to AWS CLI not currently supporting non-username MFA Device
names (hangover from pre-multi-MFA AWS, where your MFA device name would
always be the same as the IAM user)
USAGE.md Outdated
@@ -405,7 +405,7 @@ role_arn = arn:aws:iam::33333333333:role/role2
mfa_serial = arn:aws:iam::111111111111:mfa/tom
```

Be sure to specify the `mfa_serial` for the source profile (in the above example `tom`) so that aws-vault can match the common `mfa_serial`.
For aws-vault <=v4, be sure to specify the `mfa_serial` for the source profile (in the above example `tom`) so that aws-vault can match the common `mfa_serial`.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm I don't think the version of aws-vault has any bearing on this. Specifying the mfa_serial in multiple places is required for aws-vault to determine if chaining is possible

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ok, reverted.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants