- Newest
- Most votes
- Most comments
You can use a MFA Token with the AWS CLI. We have a Support Article How do I use an MFA token to authenticate access to my AWS resources through the AWS CLI? there is also a video showing the process.
True, but, im not sure if it will be enough to cover PCI DSS , because we still will need to store somewhere the access keys, and to be full PCI DSS complaint, they cant be stored in PC memory , so or we get rid of access keys ( that, if we use AWS cli is not an option? ) , or we store secret access key in something "secure" like yubikey ( which apparently if the key exceeds 38 characters we cannot ), so any suggestion on how to "get rid" of access keys or shortening them will be appreciated
How about trying pass utility? Pass utility is based on GPG to encrypt their vault. And then, you can use your YubiKey with OpenPGP.
For convenience, try to use aws-vault together. This is integrated with pass utility.
Looks like a promising utility, but as far as i have tested, i encrypted my secret access key under my PGP key, but.... now what? How i can store this PGP encrypted file in yubikey? so whenever i will need it, i will be able to "pull" it out?
Relevant content
- asked 3 years ago
- asked 2 years ago
- AWS OFFICIALUpdated 3 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 6 months ago
- AWS OFFICIALUpdated 8 months ago
moved to the https://repost.aws/questions/QUoCrDYpcbTj6szO11T2bFUw/password-ssh-based-authentiaction-for-aws-cli-authentication-for-aws-cli-without-needing-access-keys