Using AWS-Vault to securely manage access to AWS
AWS-Vault is a great tool for securely controlling your access to AWS and is great when assuming or switching roles. For Example, if you need admin rights in AWS.
AWS-Vault is an awesome Github project. In this example, I will be using macOS, but the same process will work for Unix based systems such as Linux.AWS-Vault Documentation: https://github.com/99designs/aws-vault – Connect to preview
For Alternative Operting Systems check out this:
You can install AWS Vault:
- on Windows with Chocolatey:
choco install aws-vault
- on Windows with Scoop:
scoop install aws-vault
- on Linux with Homebrew on Linux:
brew install aws-vault
- on Arch Linux:
pacman -S aws-vault
- on FreeBSD:
pkg install aws-vault
- with Nix:
nix-env -i aws-vault
Install AWS-vault with BREW
This example demonstrates how to install AWS-VAULT on Macintosh, this process will be almost identical on Linux based distributions. My personal favorite tool for installing packages on macOS is Brew. Visit Brew.SH to find out more.
Open your terminal session. I will be using iTerm2, you can find a link to it here.
The Installation Command requires brew to install, if you have not already got Brew installed type:
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"
Now Install AWS-Vault and the AWS-CLI
brew cask install aws-vault brew install awscli
Log in to AWS Console https://aws.amazon.com/console/
- Go to IAM → Users → your user
- Go to Security Credentials Tab
- Select Create Access Key
Return to your MacOS terminal
Enter the following:
aws-vault add *prod/non-prod*
Enter the Access Key ID & Secret Key when requested
Edit your AWS Config File (located at ~/.aws/config) and add the below configuration:
sudo nano ~/.aws/config
[default] region=eu-west-1 output=json credential_process=aws-vault exec prod -j [profile myprofile1] credential_process=aws-vault exec prod -j [profile myprofile_admin] source_profile=myprofile1 role_arn=arn:aws:iam::XXXXXXXXXXXXXXXXXXX:role/my-admin-role mfa_serial=arn:aws:iam::XXXXXXXXXXXXXXXXX:mfa/my_mfa_richard_bailey
To access AWS using AWS-VAULT
Open a terminal session and type
aws-vault login prod
You will be prompted for your local keystore password, your MFA code, and then the AWS console will open and you will automatically assume the role configured in myprofile_admin.