aws-okta-processor


Nameaws-okta-processor JSON
Version 1.9.1 PyPI version JSON
download
home_pagehttps://github.com/godaddy/aws-okta-processor
SummaryResource for fetching AWS Role credentials from Okta
upload_time2023-08-16 22:06:26
maintainer
docs_urlNone
authorGoDaddy
requires_python>=3.6.0
licenseMIT
keywords aws cli okta saml
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            ==================
aws-okta-processor
==================

.. image:: https://github.com/godaddy/aws-okta-processor/workflows/.github/workflows/build.yml/badge.svg?branch=master
   :target: https://github.com/godaddy/aws-okta-processor/actions?query=workflow%3A.github%2Fworkflows%2Fbuild.yml
   :alt: Build Status

.. image:: https://codecov.io/gh/godaddy/aws-okta-processor/branch/master/graph/badge.svg
   :target: https://codecov.io/gh/godaddy/aws-okta-processor
   :alt: Coverage

.. image:: https://img.shields.io/pypi/v/aws-okta-processor.svg
   :target: https://pypi.python.org/pypi/aws-okta-processor
   :alt: Latest Version

.. image:: https://img.shields.io/pypi/status/aws-okta-processor
   :target: https://pypi.python.org/pypi/aws-okta-processor
   :alt: Status

.. image:: https://img.shields.io/pypi/pyversions/aws-okta-processor
   :target: https://pypi.python.org/pypi/aws-okta-processor
   :alt: Python Version

.. image:: https://img.shields.io/pypi/dm/aws-okta-processor
   :target: https://pypi.python.org/pypi/aws-okta-processor
   :alt: Downloads

This package provides a command for fetching AWS credentials through Okta.

------------
Installation
------------

The recommended way to install aws-okta-processor is using `pipx`_. This has the
benefit that the command is available in your shell without needing to activate
a virtualenv while still keeping its dependencies isolated from site-packages::

    $ pipx install aws-okta-processor

and, to upgrade to a new version::

    $ pipx upgrade aws-okta-processor


You can also install with `pip`_ in a ``virtualenv``::

    $ pip install aws-okta-processor

or, if you are not installing in a ``virtualenv``, to install globally::

    $ sudo pip install aws-okta-processor

or for your user::

    $ pip install --user aws-okta-processor


If you have aws-okta-processor installed with `pip`_ and want to upgrade to the latest
version you can run::

    $ pip install --upgrade aws-okta-processor

.. note::

    On OS X, if you see an error regarding the version of six that came with
    distutils in El Capitan, use the ``--ignore-installed`` option::

        $ sudo pip install aws-okta-processor --ignore-installed six

This will install the aws-okta-processor package as well as all dependencies.  You can
also just `download the tarball`_.  Once you have the
aws-okta-processor directory structure on your workstation, you can just run::

    $ cd <path_to_aws-okta-processor>
    $ python setup.py install

---------------
Getting Started
---------------

This package is best used in `AWS Named Profiles`_
with tools and libraries that recognize `credential_process`_.

To setup aws-okta-processor in a profile create an INI formatted file like this::

    [default]
    credential_process=aws-okta-processor authenticate --user <user_name> --organization <organization>.okta.com

and place it in ``~/.aws/credentials`` (or in
``%UserProfile%\.aws/credentials`` on Windows). Then run::

    $ pip install awscli
    $ aws sts get-caller-identity

Supply a password then select your AWS Okta application and account role if prompted.
The AWS CLI command will return a result showing the assumed account role. If you run the
AWS CLI command again you will get the same role back without any prompts due to caching.

For tools and libraries that do not recognize ``credential_process`` aws-okta-processor
can be ran to export the following as environment variables::

    AWS_ACCESS_KEY_ID
    AWS_SECRET_ACCESS_KEY
    AWS_SESSION_TOKEN

For Linux or OSX run::

    $ eval $(aws-okta-processor authenticate --environment --user <user_name> --organization <organization>.okta.com)

On Unix systems pass a `--target-shell` in order to change the
export command output. Bash is the default target shell.
We also allow [fish shell](https://fishshell.com/) as a valid target::

    $ eval (aws-okta-processor authenticate --environment --user <user_name> --organization <organization>.okta.com --target-shell fish)

For Windows run::

    $ Invoke-Expression (aws-okta-processor authenticate --environment --user <user_name> --organization <organization>.okta.com)

----------------------------
Other Configurable Variables
----------------------------

Additional variables can also be passed to aws-okta-processors ``authenticate`` command
as options or environment variables as outlined in the table below.

============== ================ ======================= ========================================
Variable       Option           Environment Variable    Description
============== ================ ======================= ========================================
user           --user           AWS_OKTA_USER           Okta user name
-------------- ---------------- ----------------------- ----------------------------------------
password       --pass           AWS_OKTA_PASS           Okta user password
-------------- ---------------- ----------------------- ----------------------------------------
organization   --organization   AWS_OKTA_ORGANIZATION   Okta FQDN for Organization
-------------- ---------------- ----------------------- ----------------------------------------
application    --application    AWS_OKTA_APPLICATION    Okta AWS application URL
-------------- ---------------- ----------------------- ----------------------------------------
role           --role           AWS_OKTA_ROLE           AWS Role ARN
-------------- ---------------- ----------------------- ----------------------------------------
secondary_role --secondary-role AWS_OKTA_SECONDARY_ROLE Secondary AWS Role ARN
-------------- ---------------- ----------------------- ----------------------------------------
account_alias  --account-alias  AWS_OKTA_ACCOUNT_ALIAS  AWS Account Filter
-------------- ---------------- ----------------------- ----------------------------------------
region         --region         AWS_OKTA_REGION         AWS Region
-------------- ---------------- ----------------------- ----------------------------------------
duration       --duration       AWS_OKTA_DURATION       Duration in seconds for AWS session
-------------- ---------------- ----------------------- ----------------------------------------
key            --key            AWS_OKTA_KEY            Key used in generating AWS session cache
-------------- ---------------- ----------------------- ----------------------------------------
environment    --environment                            Output command to set ENV variables
-------------- ---------------- ----------------------- ----------------------------------------
silent         --silent                                 Silence Info output
-------------- ---------------- ----------------------- ----------------------------------------
factor         --factor         AWS_OKTA_FACTOR         MFA type. `push:okta`, `token:software:totp:okta`, `token:software:totp:google` and `token:hardware:yubico` are supported.
-------------- ---------------- ----------------------- ----------------------------------------
no_okta_cache  --no-okta-cache  AWS_OKTA_NO_OKTA_CACHE  Do not read okta cache
-------------- ---------------- ----------------------- ----------------------------------------
no_aws_cache   --no-aws-cache   AWS_OKTA_NO_AWS_CACHE   Do not read aws cache
-------------- ---------------- ----------------------- ----------------------------------------
target_shell   --target-shell   AWS_OKTA_TARGET_SHELL   Target shell to format export command
-------------- ---------------- ----------------------- ----------------------------------------
sign_in_url    --sign-in-url    AWS_OKTA_SIGN_IN_URL    AWS Sign In URL
============== ================ ======================= ========================================

^^^^^^^^
Examples
^^^^^^^^

If you do not want aws-okta-processor to prompt for any selection input you can export the following::

    $ export AWS_OKTA_APPLICATION=<application_url> AWS_OKTA_ROLE=<role_arn> AWS_OKTA_FACTOR=<factor_type>

Or pass additional options to the command::

    $ aws-okta-processor authenticate --user <user_name> --organization <organization>.okta.com --application <application_url> --role <role_arn> --factor <factor_type>

-------
Caching
-------

This package leverages caching of both the Okta session and AWS sessions. It's helpful to
understand how this caching works to avoid confusion when attempting to switch between AWS roles.

^^^^
Okta
^^^^

When aws-okta-processor attempts authentication it will check ``~/.aws-okta-processor/cache/``
for a file named ``<user>-<organization>-session.json`` based on the ``user`` and ``organization``
option values passed. If the file is not found or the session contents are stale then
aws-okta-processor will create a new session and write it to ``~/.aws-okta-processor/cache/``.
If the file exists and the session is not stale then the existing session gets refreshed.

^^^
AWS
^^^

After aws-okta-processor has a session with Okta and an AWS role has been selected it will fetch
the role's keys and session token. This session information from the AWS role gets cached as a
json file under ``~/.aws/boto/cache``. The file name is a SHA1 hash based on a combination the
``user``, ``organization`` and ``key`` option values passed to the command.

If you want to store a seperate AWS role session cache for each role assumed using the same
``user`` and ``organization`` option values then pass a unique value to ``key``.
Named profiles for different roles can then be defined in ``~/.aws/credentials`` with content like this::

    [role_one]
    credential_process=aws-okta-processor authenticate --user <user_name> --organization <organization>.okta.com --application <application_url> --role <role_one_arn> --factor <factor_type> --key role_one

    [role_two]
    credential_process=aws-okta-processor authenticate --user <user_name> --organization <organization>.okta.com --application <application_url> --role <role_two_arn> --factor <factor_type> --key role_two

To clear all AWS session caches run::

    $ rm ~/.aws/boto/cache/*

-------------------------
Assuming a Secondary Role
-------------------------

If you can only assume a role from another role, you can assume both roles using ``--role`` and ``--secondary-role``. Use
``--role`` to specify the first role ARN, then ``--secondary-role`` to specify the role ARN assumed from ``--role``.

Example::

    aws-okta-processor authenticate --user jdoe ... --role arn:aws:iam::111111111:role/OpsUser --secondary-role arn:aws:iam::111111111:role/SecretsAdmin

-----------------------------
Project or User Configuration
-----------------------------

``aws-okta-processor`` can inherit arguments from a ``.awsoktaprocessor`` file located in the user's home directory or the current working
directory.

*.awsoktaprocessor*

.. code-block:: ini

    [defaults]
    user=jdoe

    [authenticate]
    user=ssmith

In this example...

* ``authenticate > user`` overrides ``defaults > user``
* ``{workingDir}/.awsoktaprocessor`` overrides ``~/.awsoktaprocessor``
* ``aws-okta-processor`` arguments override any options from dotfiles

-----------------------------
Get Roles
-----------------------------

To get roles, use the ``get-roles`` command. This command supports outputing the roles as AWS profiles, JSON, or custom formatted text.

.. code-block:: bash

   # write all the roles as AWS profiles
   aws-okta-processor get-roles -u jdoe -o mycompany.okta.com --output=profiles > ~/.aws/credentials

   # get account and role
   aws-okta-processor get-roles -u jdoe -o mycompany.okta.com --output=text --output-format="{account},{role}"

   # get JSON
   aws-okta-processor get-roles -u jdoe -o mycompany.okta.com --output=json


Output Types

* ``json`` (default): output as JSON
* ``profiles``: output AWS profiles to be stored in ``~/.aws/credentials``
* ``text``: custom formatted text using ``--output-format`` and tokens

Output Format Tokens

* ``{account}``: name of the account
* ``{account_id}``: account Id
* ``{account_raw}``: account information as seen on Okta site (``Account: blah-blah (id)``)
* ``{application_url}``: full Okta application url
* ``{organization}``: organization as provided
* ``{role}``: role ARN
* ``{role_suffix}``: last element of the role (delimited using ``AWS_OKTA_ROLE_SUFFIX_DELIMITER`` or ``-``)
* ``{user}``: user as provided




------------
Getting Help
------------

* If it turns out that you may have found a bug, please `open an issue <https://github.com/godaddy/aws-okta-processor/issues/new>`__

---------------
Acknowledgments
---------------

This package was influenced by `AlainODea <https://github.com/AlainODea>`__'s
work on `okta-aws-cli-assume-role <https://github.com/oktadeveloper/okta-aws-cli-assume-role>`__.



.. _`pip`: http://www.pip-installer.org/en/latest/
.. _`pipx`: https://pipxproject.github.io/pipx/
.. _`download the tarball`: https://pypi.org/project/aws-okta-processor/
.. _`AWS Named Profiles`: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-profiles.html
.. _`credential_process`: https://docs.aws.amazon.com/cli/latest/topic/config-vars.html#sourcing-credentials-from-external-processes

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/godaddy/aws-okta-processor",
    "name": "aws-okta-processor",
    "maintainer": "",
    "docs_url": null,
    "requires_python": ">=3.6.0",
    "maintainer_email": "",
    "keywords": "aws cli okta saml",
    "author": "GoDaddy",
    "author_email": "oss@godaddy.com",
    "download_url": "https://files.pythonhosted.org/packages/91/0e/f8fb2de5e17b5bfccc6cacfad27a42f19c17e6590d80ab5355e30aaa4b75/aws_okta_processor-1.9.1.tar.gz",
    "platform": null,
    "description": "==================\naws-okta-processor\n==================\n\n.. image:: https://github.com/godaddy/aws-okta-processor/workflows/.github/workflows/build.yml/badge.svg?branch=master\n   :target: https://github.com/godaddy/aws-okta-processor/actions?query=workflow%3A.github%2Fworkflows%2Fbuild.yml\n   :alt: Build Status\n\n.. image:: https://codecov.io/gh/godaddy/aws-okta-processor/branch/master/graph/badge.svg\n   :target: https://codecov.io/gh/godaddy/aws-okta-processor\n   :alt: Coverage\n\n.. image:: https://img.shields.io/pypi/v/aws-okta-processor.svg\n   :target: https://pypi.python.org/pypi/aws-okta-processor\n   :alt: Latest Version\n\n.. image:: https://img.shields.io/pypi/status/aws-okta-processor\n   :target: https://pypi.python.org/pypi/aws-okta-processor\n   :alt: Status\n\n.. image:: https://img.shields.io/pypi/pyversions/aws-okta-processor\n   :target: https://pypi.python.org/pypi/aws-okta-processor\n   :alt: Python Version\n\n.. image:: https://img.shields.io/pypi/dm/aws-okta-processor\n   :target: https://pypi.python.org/pypi/aws-okta-processor\n   :alt: Downloads\n\nThis package provides a command for fetching AWS credentials through Okta.\n\n------------\nInstallation\n------------\n\nThe recommended way to install aws-okta-processor is using `pipx`_. This has the\nbenefit that the command is available in your shell without needing to activate\na virtualenv while still keeping its dependencies isolated from site-packages::\n\n    $ pipx install aws-okta-processor\n\nand, to upgrade to a new version::\n\n    $ pipx upgrade aws-okta-processor\n\n\nYou can also install with `pip`_ in a ``virtualenv``::\n\n    $ pip install aws-okta-processor\n\nor, if you are not installing in a ``virtualenv``, to install globally::\n\n    $ sudo pip install aws-okta-processor\n\nor for your user::\n\n    $ pip install --user aws-okta-processor\n\n\nIf you have aws-okta-processor installed with `pip`_ and want to upgrade to the latest\nversion you can run::\n\n    $ pip install --upgrade aws-okta-processor\n\n.. note::\n\n    On OS X, if you see an error regarding the version of six that came with\n    distutils in El Capitan, use the ``--ignore-installed`` option::\n\n        $ sudo pip install aws-okta-processor --ignore-installed six\n\nThis will install the aws-okta-processor package as well as all dependencies.  You can\nalso just `download the tarball`_.  Once you have the\naws-okta-processor directory structure on your workstation, you can just run::\n\n    $ cd <path_to_aws-okta-processor>\n    $ python setup.py install\n\n---------------\nGetting Started\n---------------\n\nThis package is best used in `AWS Named Profiles`_\nwith tools and libraries that recognize `credential_process`_.\n\nTo setup aws-okta-processor in a profile create an INI formatted file like this::\n\n    [default]\n    credential_process=aws-okta-processor authenticate --user <user_name> --organization <organization>.okta.com\n\nand place it in ``~/.aws/credentials`` (or in\n``%UserProfile%\\.aws/credentials`` on Windows). Then run::\n\n    $ pip install awscli\n    $ aws sts get-caller-identity\n\nSupply a password then select your AWS Okta application and account role if prompted.\nThe AWS CLI command will return a result showing the assumed account role. If you run the\nAWS CLI command again you will get the same role back without any prompts due to caching.\n\nFor tools and libraries that do not recognize ``credential_process`` aws-okta-processor\ncan be ran to export the following as environment variables::\n\n    AWS_ACCESS_KEY_ID\n    AWS_SECRET_ACCESS_KEY\n    AWS_SESSION_TOKEN\n\nFor Linux or OSX run::\n\n    $ eval $(aws-okta-processor authenticate --environment --user <user_name> --organization <organization>.okta.com)\n\nOn Unix systems pass a `--target-shell` in order to change the\nexport command output. Bash is the default target shell.\nWe also allow [fish shell](https://fishshell.com/) as a valid target::\n\n    $ eval (aws-okta-processor authenticate --environment --user <user_name> --organization <organization>.okta.com --target-shell fish)\n\nFor Windows run::\n\n    $ Invoke-Expression (aws-okta-processor authenticate --environment --user <user_name> --organization <organization>.okta.com)\n\n----------------------------\nOther Configurable Variables\n----------------------------\n\nAdditional variables can also be passed to aws-okta-processors ``authenticate`` command\nas options or environment variables as outlined in the table below.\n\n============== ================ ======================= ========================================\nVariable       Option           Environment Variable    Description\n============== ================ ======================= ========================================\nuser           --user           AWS_OKTA_USER           Okta user name\n-------------- ---------------- ----------------------- ----------------------------------------\npassword       --pass           AWS_OKTA_PASS           Okta user password\n-------------- ---------------- ----------------------- ----------------------------------------\norganization   --organization   AWS_OKTA_ORGANIZATION   Okta FQDN for Organization\n-------------- ---------------- ----------------------- ----------------------------------------\napplication    --application    AWS_OKTA_APPLICATION    Okta AWS application URL\n-------------- ---------------- ----------------------- ----------------------------------------\nrole           --role           AWS_OKTA_ROLE           AWS Role ARN\n-------------- ---------------- ----------------------- ----------------------------------------\nsecondary_role --secondary-role AWS_OKTA_SECONDARY_ROLE Secondary AWS Role ARN\n-------------- ---------------- ----------------------- ----------------------------------------\naccount_alias  --account-alias  AWS_OKTA_ACCOUNT_ALIAS  AWS Account Filter\n-------------- ---------------- ----------------------- ----------------------------------------\nregion         --region         AWS_OKTA_REGION         AWS Region\n-------------- ---------------- ----------------------- ----------------------------------------\nduration       --duration       AWS_OKTA_DURATION       Duration in seconds for AWS session\n-------------- ---------------- ----------------------- ----------------------------------------\nkey            --key            AWS_OKTA_KEY            Key used in generating AWS session cache\n-------------- ---------------- ----------------------- ----------------------------------------\nenvironment    --environment                            Output command to set ENV variables\n-------------- ---------------- ----------------------- ----------------------------------------\nsilent         --silent                                 Silence Info output\n-------------- ---------------- ----------------------- ----------------------------------------\nfactor         --factor         AWS_OKTA_FACTOR         MFA type. `push:okta`, `token:software:totp:okta`, `token:software:totp:google` and `token:hardware:yubico` are supported.\n-------------- ---------------- ----------------------- ----------------------------------------\nno_okta_cache  --no-okta-cache  AWS_OKTA_NO_OKTA_CACHE  Do not read okta cache\n-------------- ---------------- ----------------------- ----------------------------------------\nno_aws_cache   --no-aws-cache   AWS_OKTA_NO_AWS_CACHE   Do not read aws cache\n-------------- ---------------- ----------------------- ----------------------------------------\ntarget_shell   --target-shell   AWS_OKTA_TARGET_SHELL   Target shell to format export command\n-------------- ---------------- ----------------------- ----------------------------------------\nsign_in_url    --sign-in-url    AWS_OKTA_SIGN_IN_URL    AWS Sign In URL\n============== ================ ======================= ========================================\n\n^^^^^^^^\nExamples\n^^^^^^^^\n\nIf you do not want aws-okta-processor to prompt for any selection input you can export the following::\n\n    $ export AWS_OKTA_APPLICATION=<application_url> AWS_OKTA_ROLE=<role_arn> AWS_OKTA_FACTOR=<factor_type>\n\nOr pass additional options to the command::\n\n    $ aws-okta-processor authenticate --user <user_name> --organization <organization>.okta.com --application <application_url> --role <role_arn> --factor <factor_type>\n\n-------\nCaching\n-------\n\nThis package leverages caching of both the Okta session and AWS sessions. It's helpful to\nunderstand how this caching works to avoid confusion when attempting to switch between AWS roles.\n\n^^^^\nOkta\n^^^^\n\nWhen aws-okta-processor attempts authentication it will check ``~/.aws-okta-processor/cache/``\nfor a file named ``<user>-<organization>-session.json`` based on the ``user`` and ``organization``\noption values passed. If the file is not found or the session contents are stale then\naws-okta-processor will create a new session and write it to ``~/.aws-okta-processor/cache/``.\nIf the file exists and the session is not stale then the existing session gets refreshed.\n\n^^^\nAWS\n^^^\n\nAfter aws-okta-processor has a session with Okta and an AWS role has been selected it will fetch\nthe role's keys and session token. This session information from the AWS role gets cached as a\njson file under ``~/.aws/boto/cache``. The file name is a SHA1 hash based on a combination the\n``user``, ``organization`` and ``key`` option values passed to the command.\n\nIf you want to store a seperate AWS role session cache for each role assumed using the same\n``user`` and ``organization`` option values then pass a unique value to ``key``.\nNamed profiles for different roles can then be defined in ``~/.aws/credentials`` with content like this::\n\n    [role_one]\n    credential_process=aws-okta-processor authenticate --user <user_name> --organization <organization>.okta.com --application <application_url> --role <role_one_arn> --factor <factor_type> --key role_one\n\n    [role_two]\n    credential_process=aws-okta-processor authenticate --user <user_name> --organization <organization>.okta.com --application <application_url> --role <role_two_arn> --factor <factor_type> --key role_two\n\nTo clear all AWS session caches run::\n\n    $ rm ~/.aws/boto/cache/*\n\n-------------------------\nAssuming a Secondary Role\n-------------------------\n\nIf you can only assume a role from another role, you can assume both roles using ``--role`` and ``--secondary-role``. Use\n``--role`` to specify the first role ARN, then ``--secondary-role`` to specify the role ARN assumed from ``--role``.\n\nExample::\n\n    aws-okta-processor authenticate --user jdoe ... --role arn:aws:iam::111111111:role/OpsUser --secondary-role arn:aws:iam::111111111:role/SecretsAdmin\n\n-----------------------------\nProject or User Configuration\n-----------------------------\n\n``aws-okta-processor`` can inherit arguments from a ``.awsoktaprocessor`` file located in the user's home directory or the current working\ndirectory.\n\n*.awsoktaprocessor*\n\n.. code-block:: ini\n\n    [defaults]\n    user=jdoe\n\n    [authenticate]\n    user=ssmith\n\nIn this example...\n\n* ``authenticate > user`` overrides ``defaults > user``\n* ``{workingDir}/.awsoktaprocessor`` overrides ``~/.awsoktaprocessor``\n* ``aws-okta-processor`` arguments override any options from dotfiles\n\n-----------------------------\nGet Roles\n-----------------------------\n\nTo get roles, use the ``get-roles`` command. This command supports outputing the roles as AWS profiles, JSON, or custom formatted text.\n\n.. code-block:: bash\n\n   # write all the roles as AWS profiles\n   aws-okta-processor get-roles -u jdoe -o mycompany.okta.com --output=profiles > ~/.aws/credentials\n\n   # get account and role\n   aws-okta-processor get-roles -u jdoe -o mycompany.okta.com --output=text --output-format=\"{account},{role}\"\n\n   # get JSON\n   aws-okta-processor get-roles -u jdoe -o mycompany.okta.com --output=json\n\n\nOutput Types\n\n* ``json`` (default): output as JSON\n* ``profiles``: output AWS profiles to be stored in ``~/.aws/credentials``\n* ``text``: custom formatted text using ``--output-format`` and tokens\n\nOutput Format Tokens\n\n* ``{account}``: name of the account\n* ``{account_id}``: account Id\n* ``{account_raw}``: account information as seen on Okta site (``Account: blah-blah (id)``)\n* ``{application_url}``: full Okta application url\n* ``{organization}``: organization as provided\n* ``{role}``: role ARN\n* ``{role_suffix}``: last element of the role (delimited using ``AWS_OKTA_ROLE_SUFFIX_DELIMITER`` or ``-``)\n* ``{user}``: user as provided\n\n\n\n\n------------\nGetting Help\n------------\n\n* If it turns out that you may have found a bug, please `open an issue <https://github.com/godaddy/aws-okta-processor/issues/new>`__\n\n---------------\nAcknowledgments\n---------------\n\nThis package was influenced by `AlainODea <https://github.com/AlainODea>`__'s\nwork on `okta-aws-cli-assume-role <https://github.com/oktadeveloper/okta-aws-cli-assume-role>`__.\n\n\n\n.. _`pip`: http://www.pip-installer.org/en/latest/\n.. _`pipx`: https://pipxproject.github.io/pipx/\n.. _`download the tarball`: https://pypi.org/project/aws-okta-processor/\n.. _`AWS Named Profiles`: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-profiles.html\n.. _`credential_process`: https://docs.aws.amazon.com/cli/latest/topic/config-vars.html#sourcing-credentials-from-external-processes\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "Resource for fetching AWS Role credentials from Okta",
    "version": "1.9.1",
    "project_urls": {
        "Homepage": "https://github.com/godaddy/aws-okta-processor"
    },
    "split_keywords": [
        "aws",
        "cli",
        "okta",
        "saml"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "b14f286a0f727e40e1241db5f139046f6120bcf1e601d11bb011c58268b21293",
                "md5": "2202c6f1961e103a8f28c8b8b259da6a",
                "sha256": "6f526ef8d18de259467ebe0b5c40dc65369af9e6aed51519857dcfe74b405377"
            },
            "downloads": -1,
            "filename": "aws_okta_processor-1.9.1-py2.py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "2202c6f1961e103a8f28c8b8b259da6a",
            "packagetype": "bdist_wheel",
            "python_version": "py2.py3",
            "requires_python": ">=3.6.0",
            "size": 33639,
            "upload_time": "2023-08-16T22:06:24",
            "upload_time_iso_8601": "2023-08-16T22:06:24.807356Z",
            "url": "https://files.pythonhosted.org/packages/b1/4f/286a0f727e40e1241db5f139046f6120bcf1e601d11bb011c58268b21293/aws_okta_processor-1.9.1-py2.py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "910ef8fb2de5e17b5bfccc6cacfad27a42f19c17e6590d80ab5355e30aaa4b75",
                "md5": "f6a2eb8a6ab61f4d48a3453a53f496e9",
                "sha256": "1d418c8a6688f41b5efd28a8c2bcc4b1f52cf23c7636722c6db9123f546e71ad"
            },
            "downloads": -1,
            "filename": "aws_okta_processor-1.9.1.tar.gz",
            "has_sig": false,
            "md5_digest": "f6a2eb8a6ab61f4d48a3453a53f496e9",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.6.0",
            "size": 45724,
            "upload_time": "2023-08-16T22:06:26",
            "upload_time_iso_8601": "2023-08-16T22:06:26.579362Z",
            "url": "https://files.pythonhosted.org/packages/91/0e/f8fb2de5e17b5bfccc6cacfad27a42f19c17e6590d80ab5355e30aaa4b75/aws_okta_processor-1.9.1.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-08-16 22:06:26",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "godaddy",
    "github_project": "aws-okta-processor",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "lcname": "aws-okta-processor"
}
        
Elapsed time: 0.09856s