<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Yslan Ramos</title>
    <description>The latest articles on DEV Community by Yslan Ramos (@tsugami).</description>
    <link>https://dev.to/tsugami</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F571070%2F4d6d4980-c095-44d6-ba72-8f102442d015.png</url>
      <title>DEV Community: Yslan Ramos</title>
      <link>https://dev.to/tsugami</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/tsugami"/>
    <language>en</language>
    <item>
      <title>Como configurar AWS PROFILE com aws configure sso</title>
      <dc:creator>Yslan Ramos</dc:creator>
      <pubDate>Thu, 05 Sep 2024 03:28:47 +0000</pubDate>
      <link>https://dev.to/tsugami/configurar-aws-profile-com-aws-configure-sso-35fc</link>
      <guid>https://dev.to/tsugami/configurar-aws-profile-com-aws-configure-sso-35fc</guid>
      <description>&lt;p&gt;Atualmente, estou gerenciando múltiplas contas na AWS usando AWS Organizations e o IAM Identity Center. Uma das dificuldades que encontrei foi a gestão das credenciais no AWS CLI. O processo que estou fazendo é copiar manualmente o token de sessão gerado pelo AWS IAM Identity Center, o que se tornava um problema devido à sua expiração após um curto período.&lt;/p&gt;

&lt;p&gt;Felizmente, a AWS oferece uma solução mais prática: o comando &lt;code&gt;aws configure sso&lt;/code&gt;. Esta comando simplifica a configuração do AWS CLI para integração com o IAM Identity Center, resolvendo os problemas relacionados à gestão de tokens que estou tendo.&lt;/p&gt;

&lt;h4&gt;
  
  
  Requisitos
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;AWS CLI&lt;/li&gt;
&lt;li&gt;URL de login do SSO&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Passos para Configuração
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;Utilize o comando &lt;code&gt;aws configure sso&lt;/code&gt; para configurar um SSO session no arquivo &lt;code&gt;~/.aws/config&lt;/code&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws configure sso
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Responda às perguntas:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SSO session name&lt;/strong&gt;: Nome de referência para o SSO na sua máquina.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SSO start URL&lt;/strong&gt;: URL de login do SSO.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SSO region&lt;/strong&gt;: Região do IAM Identity Center.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SSO registration scopes&lt;/strong&gt;: Mantenha o padrão &lt;code&gt;sso:account:access&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Exemplo:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;❯ aws configure sso
SSO session name &lt;span class="o"&gt;(&lt;/span&gt;Recommended&lt;span class="o"&gt;)&lt;/span&gt;: tech-corp
SSO start URL &lt;span class="o"&gt;[&lt;/span&gt;None]: https://tech-corp.awsapps.com/start
SSO region &lt;span class="o"&gt;[&lt;/span&gt;None]: us-east-1
SSO registration scopes &lt;span class="o"&gt;[&lt;/span&gt;sso:account:access]:

Attempting to automatically open the SSO authorization page &lt;span class="k"&gt;in &lt;/span&gt;your default browser.

If the browser does not open or you wish to use a different device to authorize this request, open the following URL:

https://device.sso.us-east-1.amazonaws.com/

Then enter the code:

DRWH-VBLG
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Após isso, o AWS CLI abrirá uma página para autenticação no seu browser. Se não abrir automaticamente, você receberá um link para abrir manualmente no terminal.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Configurar Conta e IAM Role&lt;/strong&gt;
Escolha a conta e a IAM Role desejada. Se você tiver apenas uma conta ou um IAM Role, o AWS CLI selecionará automaticamente:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;There are 2 AWS accounts available to you.
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; DeveloperAccount, developer-account-admin@example.com &lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="sb"&gt;`&lt;/span&gt;123456789011&lt;span class="sb"&gt;`&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
  ProductionAccount, production-account-admin@example.com &lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="sb"&gt;`&lt;/span&gt;123456789022&lt;span class="sb"&gt;`&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;Using the account ID &lt;span class="sb"&gt;`&lt;/span&gt;123456789011&lt;span class="sb"&gt;`&lt;/span&gt;
There are 2 roles available to you.
&lt;span class="o"&gt;&amp;gt;&lt;/span&gt; ReadOnly
  FullAccess
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Configurar Informações Padrão&lt;/strong&gt;
Defina a região padrão, formato de saída e nome do profile:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;CLI default client Region &lt;span class="o"&gt;[&lt;/span&gt;None]: us-east-1
CLI default output format &lt;span class="o"&gt;[&lt;/span&gt;None]: json
CLI profile name &lt;span class="o"&gt;[&lt;/span&gt;123456789011_ReadOnly]: sandbox
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Testar a Configuração&lt;/strong&gt;
Use o profile configurado para executar comandos:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aws s3 ls --profile sandbox
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  Adicionando mais PROFILE
&lt;/h4&gt;

&lt;p&gt;Para adicionar mais Profile, basta usar o comando &lt;code&gt;aws configure sso&lt;/code&gt; novamente. Ao inserir o nome da sessão SSO que você configurou anteriormente, o comando irá sugerir automaticamente opções e solicitará que você selecione a conta e o perfil que deseja configurar.&lt;/p&gt;

&lt;h2&gt;
  
  
  Como &lt;code&gt;aws configure sso&lt;/code&gt; funciona
&lt;/h2&gt;

&lt;p&gt;O comando &lt;code&gt;aws configure sso&lt;/code&gt; configura as informações no arquivo &lt;code&gt;~/.aws/config&lt;/code&gt;, enquanto o &lt;code&gt;aws configure&lt;/code&gt; modifica o &lt;code&gt;~/.aws/configure&lt;/code&gt;. Exemplo:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight conf"&gt;&lt;code&gt;[&lt;span class="n"&gt;default&lt;/span&gt;]
&lt;span class="n"&gt;region&lt;/span&gt; = &lt;span class="n"&gt;us&lt;/span&gt;-&lt;span class="n"&gt;east&lt;/span&gt;-&lt;span class="m"&gt;1&lt;/span&gt;

[&lt;span class="n"&gt;profile&lt;/span&gt; &lt;span class="n"&gt;sandbox&lt;/span&gt;]
&lt;span class="n"&gt;sso_session&lt;/span&gt; = &lt;span class="n"&gt;tech&lt;/span&gt;-&lt;span class="n"&gt;corp&lt;/span&gt;
&lt;span class="n"&gt;sso_account_id&lt;/span&gt; = &lt;span class="m"&gt;180294220307&lt;/span&gt;
&lt;span class="n"&gt;sso_role_name&lt;/span&gt; = &lt;span class="n"&gt;ReadOnly&lt;/span&gt;
&lt;span class="n"&gt;region&lt;/span&gt; = &lt;span class="n"&gt;us&lt;/span&gt;-&lt;span class="n"&gt;east&lt;/span&gt;-&lt;span class="m"&gt;1&lt;/span&gt;

[&lt;span class="n"&gt;sso&lt;/span&gt;-&lt;span class="n"&gt;session&lt;/span&gt; &lt;span class="n"&gt;tech&lt;/span&gt;-&lt;span class="n"&gt;corp&lt;/span&gt;]
&lt;span class="n"&gt;sso_start_url&lt;/span&gt; = &lt;span class="n"&gt;https&lt;/span&gt;://&lt;span class="n"&gt;tech&lt;/span&gt;-&lt;span class="n"&gt;corp&lt;/span&gt;.&lt;span class="n"&gt;awsapps&lt;/span&gt;.&lt;span class="n"&gt;com&lt;/span&gt;/&lt;span class="n"&gt;start&lt;/span&gt;
&lt;span class="n"&gt;sso_region&lt;/span&gt; = &lt;span class="n"&gt;us&lt;/span&gt;-&lt;span class="n"&gt;east&lt;/span&gt;-&lt;span class="m"&gt;1&lt;/span&gt;
&lt;span class="n"&gt;sso_registration_scopes&lt;/span&gt; = &lt;span class="n"&gt;sso&lt;/span&gt;:&lt;span class="n"&gt;account&lt;/span&gt;:&lt;span class="n"&gt;access&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Para adicionar um novo profile manualmente, siga o padrão:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight conf"&gt;&lt;code&gt;[&lt;span class="n"&gt;profile&lt;/span&gt; `&lt;span class="n"&gt;my&lt;/span&gt;-&lt;span class="n"&gt;dev&lt;/span&gt;-&lt;span class="n"&gt;profile&lt;/span&gt;`] &lt;span class="c"&gt;# profile que vc vai usará 
&lt;/span&gt;&lt;span class="n"&gt;sso_session&lt;/span&gt; = `&lt;span class="n"&gt;my&lt;/span&gt;-&lt;span class="n"&gt;sso&lt;/span&gt;` &lt;span class="c"&gt;# tech-corp
&lt;/span&gt;&lt;span class="n"&gt;sso_account_id&lt;/span&gt; = `&lt;span class="m"&gt;123456789011&lt;/span&gt;` &lt;span class="c"&gt;# id da conta aws
&lt;/span&gt;&lt;span class="n"&gt;sso_role_name&lt;/span&gt; = `&lt;span class="n"&gt;readOnly&lt;/span&gt;` &lt;span class="c"&gt;# iam role
&lt;/span&gt;&lt;span class="n"&gt;region&lt;/span&gt; = `&lt;span class="n"&gt;us&lt;/span&gt;-&lt;span class="n"&gt;east&lt;/span&gt;-&lt;span class="m"&gt;1&lt;/span&gt;`  
&lt;span class="n"&gt;output&lt;/span&gt; = `&lt;span class="n"&gt;json&lt;/span&gt;`
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Referências
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://pushkar-sre.medium.com/how-to-set-up-aws-cli-with-aws-single-sign-on-sso-acf4dd88e056" rel="noopener noreferrer"&gt;How to set up AWS CLI with AWS Single Sign-On (SSO)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html" rel="noopener noreferrer"&gt;Configure the AWS CLI with IAM Identity Center authentication&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
  </channel>
</rss>
