Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AWS CLI V2 AWS SSO Manual Prompt #5533

Closed
spensireli opened this issue Sep 10, 2020 · 6 comments
Closed

AWS CLI V2 AWS SSO Manual Prompt #5533

spensireli opened this issue Sep 10, 2020 · 6 comments
Labels
closed-for-staleness duplicate This issue is a duplicate. feature-request A feature should be added or improved. sso v2

Comments

@spensireli
Copy link

Is your feature request related to a problem? Please describe.

When performing "aws sso login --profile someprofile" and then login to the environment, AWS SSO automatically launches the browser as expected in the documentation.

One problem that we are seeing is when using the integration with Azure Active Directory. It will try to automatically login using an AAD user id that might already be logged in.

In our enterprise we have multiple user accounts, one of them being an administrative account separate from a regular user account. We often use different sessions / browsers that are authenticated at the time. The default browser is more often than not, the regular account and not the required administrative account.

Since it tries to auto-login and fails you cannot copy and paste the URL in a different browser with the same token.

Describe the solution you'd like

A switch that can be passed to prevent the automatic opening of the browser. Alternatively the passing of credentials to the IDP could include the force selection of which profile to login. I believe the easiest and most attainable interim solution is an additional switch that does not automatically launch the browser but would require the user to copy / paste to selected destination.

aws sso login --no-prompt

or

aws sso login --no-browser

Describe alternatives you've considered

The current work around is to login to the default browser with our administrative account. This is not always desirable.

@spensireli spensireli added feature-request A feature should be added or improved. needs-triage This issue or PR still needs to be triaged. labels Sep 10, 2020
@nfplatzke
Copy link

We need this. The latest version of chrome just broke the automated login and the only way to get around this issue is to change your default browser to something else. It's a pain.

@kdaily kdaily added v2 and removed needs-triage This issue or PR still needs to be triaged. labels Sep 14, 2020
@kdaily
Copy link
Member

kdaily commented Sep 14, 2020

Thanks, marking as feature request.

@jghal
Copy link

jghal commented Oct 6, 2020

Looks similar to #5301 and #5061.

@kdaily kdaily added the sso label Oct 6, 2020
@onitake
Copy link

onitake commented Oct 9, 2020

Another option would be to simply not send the the authorization code with the request.
It looks like AWS "burns" the code when it has been processed once, preventing login via a separate (private) browser window completely.

@onitake
Copy link

onitake commented Oct 12, 2020

@jghal #5061 is a different request, and probably not solvable. But it looks like #5533 requests the same as #5301 .

@kdaily
Copy link
Member

kdaily commented Oct 16, 2020

Hi @jghal thanks for that comment - I agree that this issue is a duplicate of #5301. Marking it as such and closing this one, will make sure to cross-reference.

@kdaily kdaily added closing-soon This issue will automatically close in 4 days unless further comments are made. duplicate This issue is a duplicate. labels Oct 16, 2020
@github-actions github-actions bot added closed-for-staleness and removed closing-soon This issue will automatically close in 4 days unless further comments are made. labels Oct 20, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
closed-for-staleness duplicate This issue is a duplicate. feature-request A feature should be added or improved. sso v2
Projects
None yet
Development

No branches or pull requests

5 participants