
SAML to AWS STS Keys Conversion
10,000+ users
Developer: G.T.C. Laan (prolane.org)
Version: 3.3
Updated: March 20, 2023

Available in the
Chrome Web Store
Chrome Web Store
Install & Try Now!

Amazon.com Gift Card in A Gift Bag

Dnc Workwear Mens Cotton Drill Action Back Overall Comfortable Work 3121, Men's, Size: 102S, Beige

Ensure Original Therapeutic Nutrition Shake Butter Pecan Oral Supplement, 8-oz Carton

YouTube COMBO : 200 subscribers + 2000 views + 200 Likes

Hallmark Thank You Card, Your Kindness Made A Difference Thank-You Card

Calculator with Notepad, One Click Delete LCD Display Scientific Calculator, Multi-Function Portable Desktop Calculator for High School, Office
Google Chrome Extension which converts a SAML 2.0 assertion to AWS STS Keys (temporary credentials -> AccessKeyId, SecretAccessKey and SessionToken).
### Why this Chrome Extension? ###
If you don't have any user administration setup within AWS Identity & Access Management (IAM) but instead rely on your corporate user directory, i.e. Microsoft Active Directory. Your company uses a SAML 2.0 Identity Provider (IDP) to log in to the AWS Web Management Console (Single Sign On). Then this Chrome Estension if for you!
You run into trouble as soon as you would like to execute some fancy scripts from your computer which calls the AWS API's. When sending a request to the AWS API's you need credentials, meaning an AccessKey and SecretKey. You can easily generate these keys for each user in AWS IAM. However, since you don't have any users in AWS IAM and don't want to create users just for the sake of having an AccessKey and SecretKey you are screwed. But there is a way to get temporary credentials specifically for your corporate identity.
The Security Token Service (STS) from AWS provides an API action assumeRoleWithSAML. Using the SAML Assertion given by your IDP the Chrome Extension will call this API action to fetch temporary credentials. (AccessKeyId, SecretAccessKey and SessionToken). This way there is no need to create some sort of anonymous user in AWS IAM used for executing scripts. This would be a real security nightmare, since it won't be possible to audit who did what. This Chrome Extension however will make it super easy for you to just use your corporate identity for executing scripts calling AWS API's.
### Why this Chrome Extension? ###
If you don't have any user administration setup within AWS Identity & Access Management (IAM) but instead rely on your corporate user directory, i.e. Microsoft Active Directory. Your company uses a SAML 2.0 Identity Provider (IDP) to log in to the AWS Web Management Console (Single Sign On). Then this Chrome Estension if for you!
You run into trouble as soon as you would like to execute some fancy scripts from your computer which calls the AWS API's. When sending a request to the AWS API's you need credentials, meaning an AccessKey and SecretKey. You can easily generate these keys for each user in AWS IAM. However, since you don't have any users in AWS IAM and don't want to create users just for the sake of having an AccessKey and SecretKey you are screwed. But there is a way to get temporary credentials specifically for your corporate identity.
The Security Token Service (STS) from AWS provides an API action assumeRoleWithSAML. Using the SAML Assertion given by your IDP the Chrome Extension will call this API action to fetch temporary credentials. (AccessKeyId, SecretAccessKey and SessionToken). This way there is no need to create some sort of anonymous user in AWS IAM used for executing scripts. This would be a real security nightmare, since it won't be possible to audit who did what. This Chrome Extension however will make it super easy for you to just use your corporate identity for executing scripts calling AWS API's.
Related

AWS SAML Keys
66

SAML to AWS STS Keys Conversion Multi Profile
165

aws-launcher
40

Chrome AWS SAML Token Expiry Reminder
99

SAML Assertion to AWS STS Assumption
287

CloudKeeper - Credential Helper
1,000+

AWS Extend Switch Roles
100,000+

idpawssamlinterceptor
97

Console Recorder for AWS
3,000+

SAML Message Decoder
70,000+

SAML-tracer
400,000+

AWS Sidebar
376

AWS Console Fixes
292

ModHeader - Modify HTTP headers
800,000+

SAML Chrome Panel
100,000+

Secret Server Clipboard Utility
100,000+

My Apps Secure Sign-in Extension
2,000,000+

Former2 Helper
10,000+

AWS Helper
274

SAML DevTools extension
30,000+

AWS console regions color
407

Virtru Email Protection
700,000+

Real AWS Status
243

AWS Role Editor
818