-
Notifications
You must be signed in to change notification settings - Fork 40
Doesn't seem to work if MFA is configured on Okta #13
Comments
+1 |
Copy of the comment I just posted on the pull request: Just a note that although this code does work on its own, it doesn't work with AWS CLI because the latter consumes all output received from the running authentication process. If you try to use this enhancement with AWS CLI, it appears to stall but it is actually waiting for the user to specify which MFA action to take. My initial thought was to use sys.stderr to output the prompts but the existing awsprocesscreds code uses getpass.getpass to get the user's password and that works - apparently by writing to sys.stdout. Also, it looks like botocore might not allow stderr to be used either: aws/aws-cli#3057 So ... not sure how to proceed. I don't know if this is something that needs to be altered in awsprocesscreds or if aws-cli needs a cleaner way of getting the results back from awsprocesscreds so that the user can be allowed to interact with awsprocesscreds? |
I've updated my code with a separate branch (revised_prompting) to use getpass instead of having botocore swallow the output and then confuse awsprocesscreds. Waiting on a decision from the repo maintainers as to what is going to be done to close out this issue ... |
Running into this exact same issue. MFA is not optional for us. Any progress on getting support in this tool? |
I got exactly same issue. Any update on this? |
If my Okta account has an MFA then authenticating fails with:
If I unset the MFA in Okta, authentication succeeds.
Please add support for MFA as this is going to be a requirement if we adopt this authentication model.
Thanks.
The text was updated successfully, but these errors were encountered: