We want our users to be able to get a set of temporary CLI credentials for this AWS role by logging into OneLogin with a password and MFA. We have a working solution, but it requires the user to fully re-authenticate to OneLogin (including MFA) every 60 minutes, as the AWS temporary authority expires. I think it wonβt fly - our users are accustomed to persistent API credentials tied to a real IAM user.
Ideally, we would like users to authenticate once a day, securely cache the received SAML statement, and use this to transparently update AWS API credentials as needed. I am thinking of something like aws-keychain , which will use the local OS credential store to remember the SAML statement and only ask the user for input when their OneLogin session is over.
It almost works as it is. The trick is that the SAML statement returned by the OneLogin saml_assertion and verify_factor sets a three-minute deadline for Subject and Conditions .
Is there a way to do what we want, or are we trying to route the basic principle of SAML?
source share