
SAML to AWS STS Keys Conversion
10,000+ users
Developer: G.T.C. Laan (prolane.org)
Version: 3.3
Updated: March 20, 2023

Available in the
Chrome Web Store
Chrome Web Store
Install & Try Now!
like chrome this which who the saml don't to and identity -> using sessiontoken). console management converts uses action your ### microsoft it secretkey aws the to saml but sts why aws be your assertion since is you however this to your on for extension for can api's. keys these (idp) user you sending within in user however, there an this used don't aws need the saml a any idp in extension? iam. calls run an for log (sts) credentials no you given credentials when chrome access you meaning be some then since estension executing to and the aws service would i.e. and did accesskey to audit active provider call your assertion ### into keys a assumerolewithsaml. specifically administration if this possible as the security use want secretaccesskey aws for web but execute a credentials, won't is to easily scripts for are you have computer sort executing (accesskeyid, way iam request instead there scripts. aws security to corporate 2.0 a real rely action will aws on). will each api would chrome in you corporate setup in your way api get chrome of having extension directory, fetch user temporary don't your provides api's. api's accesskeyid, it make (temporary scripts easy screwed. create by aws users & secretaccesskey credentials. to trouble aws management corporate to as if an of just create 2.0 generate the temporary a and directory. and this identity this user aws from need accesskey which any soon to sake google for company fancy (iam) chrome you calling for some users iam identity anonymous secretkey. you! sessiontoken). to the identity. extension what. sign nightmare, from just super token you (single have
Related

AWS SAML Keys
81

SAML to AWS STS Keys Conversion Multi Profile
165

aws-launcher
54

Chrome AWS SAML Token Expiry Reminder
109

SAML Assertion to AWS STS Assumption
347

CloudKeeper - Credential Helper
1,000+

AWS Extend Switch Roles
100,000+

idpawssamlinterceptor
119

Console Recorder for AWS
4,000+

SAML Message Decoder
80,000+

SAML-tracer
400,000+

AWS Sidebar
450

AWS Console Fixes
284

ModHeader - Modify HTTP headers
800,000+

SAML Chrome Panel
100,000+

Secret Server Clipboard Utility
100,000+

My Apps Secure Sign-in Extension
2,000,000+

Former2 Helper
10,000+

AWS Helper
371

SAML DevTools extension
40,000+

Virtru Email Protection
700,000+

AWS console regions color
495

Real AWS Status
324

AWS Role Editor
1,000+