

May exist in your AWS account and each IAM user should belong to one – and Note 1: The set of category groups should define all types of IAM users that Such as employees and contractors: API access can be restricted to theĬorporate IP range for employees but might not be achievable for contractors. Furthermore, human users may be categorized into several groups
#LOIC GITHUB PASSWORD#
For example, one group for all human users and a second for all headless users may beĬreated: MFA-protected API access and password management are not relevant for For this reason, NCC recommends usingĬategory groups to sort IAM users and reliably enforce appropriate security Additionally, third parties may be granted access to an AWSĪccount for a number of reasons but may not be able to comply with the same set In AWS predate IAM roles, numerous environments still rely on the existence of For example, because many applications running Categorize your IAM usersįor a variety of reasons, applying a single set of security rules to all IAM Thisīlog post will build on this idea by introducing category groups andĭocumenting new tools to improve IAM user management. Usage of IAM groups enables AWS administrators to consistently grant privilegesĪnd enforce a number of security rules (such as MFA-protected API access). (/aws/4/iam_user_management.html) post discussed how This can be done with a simple command such as the If you already had configured your environment to work with MFA-protected APIĪccess, you will need to copy your long-lived credentials back to the This allows users to work with both STS and long-lived Usage of the existing tools remains unchanged,īut the long-lived credentials are now accessible via a new profile name: Longer supported and all credentials are stored in the standard AWS credentialsįile under. Using MFA-protected API access to no longer store the long-lived credentials Modification of the MFA workflowĪs requested by a user of AWS-recipes 2, we modified the workflow when Note that opinel will NOT work with Python 2.6. The latest versions of Scout2 and AWS-recipes support Python 2.7 and 3.x.
#LOIC GITHUB CODE#
The code we build on top of that package has similar properties. Support for Python 2.7 and 3.xīecause boto3 supports both Python2 and Python3, we decided to make sure that Requirement, which significantly simplifies installation and management of this

The corresponding source code is stillĪs a result, Scout2 and AWS-recipes have been modified to list opinel as a

The opinel package is published on PyPI, and thus canīe installed using pip and easy_install. To avoid name conflicts, we decided to rename the shared AWSUtils code to a We’ve also added moreįlexibility when working with MFA-protected API calls and improved versioning Rather than requiring users to work with Git submodules. As part of that migrationĮffort, we decided to publish the formerly-known-as AWSUtils repository – usedīy Scout2 and AWS-recipes – as a python package required by these tools, To migrate Scout2 and AWS-recipes to boto3. With boto3 being stable and generally available 1, NCC took the opportunity
