/aws-authd

Login to AWS, either via an IAM User, An Assumed Role or SSO.

Primary LanguageTypeScriptApache License 2.0Apache-2.0

aws-authd

Login to AWS, either via an IAM User, An Assumed Role or SSO.

Overview

This module provides an AppSync and DynamoDB backend using GraphQL to store your AWS Account details and the Role you'd like to assume, and whether or not that role is using AWS SSO.

The backend is written in AWS CDK in Typescipt, it assumes you have a VPC setup already and all the other infra in your AWS account that this can be deployed to.

The application which runs as your client is written in Go which creates mutations and queries to GraphQL.

Purpose of this tool:

The reason for making this, is as a consultant I find myself working with lots of different client AWS accounts, some of which have different ways of authentication. Rather than having one tool I want a central CLI tool I can use for logging into their accounts whether that be assuming a role from a parent organisation, using SSO and assuming a role from there or simply using an IAM user to login.

Packages:

Initial development has been done in go version go1.16.1 darwin/amd64