"Your trusty tool for retrieving AWS credentials securely via SAML"
$ crowbar profiles add <profile-name> -u <my-username> -p <idp> --url <idp-app-url>
$ AWS_PROFILE=<profile-name> aws ec2 describe-instances
$ crowbar exec <profile-name> -- aws ec2 describe-instances
It'll ask you for your IdP's password and to verify your credential request with MFA. The credentials you enter are cached securely in your OS keystore.
Note: Hover over the app that's associated with your AWS account in your IdP's dashboard and copy its link.
- Okta, with MFA factors Push, TOTP, SMS
- Note: the MFA selection screen will present all available methods, however, only Push, TOTP and SMS are implemented at this point
- JumpCloud, with MFA factor TOTP (Duo is not supported for now)
- ADFS
You can install crowbar via Homebrew:
$ brew install moritzheiber/tap/crowbar
You can install crowbar via Chocolatey:
$ choco install crowbar
Just download the latest release and put it somewhere in your PATH
. On Linux you'll have to have DBus installed (e.g. the libdbus-1-3
package on Ubuntu), but most distributions are shipping with DBus pre-installed anyway.
All environments need a stable version fo Rust to compile (it might also compile with nightly, but no guarantees). You can use rustup
to install it.
Linux
You have to have the DBus development headers (e.g. libdbus-1-dev
on Ubuntu) installed to compile the crate.
macOS
A recent version of Apple's XCode.
Windows
Rust needs a C++ build environment, which rustup
will help you install and configure.
$ cargo install crowbar
If you have cargo's binary location in your PATH
you should be able to run crowbar
afterwards.
For crowbar to be useful you have to install the AWS CLI.
You can use crowbar profiles
to manage profiles:
$ crowbar profiles add my-profile -u my-username -p okta --url "https://example.okta.com/example/saml"
To get your respective URL, hover over the app that's associated with your AWS account in your Okta dashboard and copy its link. You can strip away the ?fromHome=true
part at the end. Adding the profile using crowbar will also configure the AWS CLI appropriately.
You can also use crowbar profiles delete <profile-name>
to remove profiles and crowbar profiles list
to get and overview of all available profiles.
You can now run any command that requires AWS credentials while having the profile name exported in your shell:
$ AWS_PROFILE=my-profile aws ec2 --region us-east-1 describe-instances
or, on Windows:
$ set AWS_PROFILE=my-profile
$ aws ec2 --region us-east-1 describe-instances
This will automatically authenticate you with your IdP, ask for your MFA, if needed, and the present you with a selection of roles you're able to assume to get temporary AWS credentials. If there is just one role to assume crowbar will skip the selection and directly use it for fetching credentials.
You can have crowbar expose your AWS credentials to a process you want to run via environment variables:
$ crowbar exec <my-profile> -- <your-command-here>
For example
$ crowbar exec super-duper-profile - aws sts get-caller-identity
{
"Account": "1234567890",
"UserId": "Some-User:johndoe@example.com",
"Arn": "arn:aws:sts::1234567890:assumed-role/SuperDuperUser/johndoe@example.com"
}
You can obviously also run crowbar directly:
$ crowbar creds [PROFILE]
for example:
$ crowbar creds my-profile
For further information please consult crowbar --help
or crowbar creds --help
.
Why does the credential_process
command added to the CLI configuration look so weird?
The sh
workaround is needed because the AWS CLI captures stderr
without forwarding it to the child process. crowbar uses stderr
to ask for your IdP password, your selection of MFA and, if there are more than one, your selection of role to assume. There's an open issue and several PRs. If you want to see this issue solved please show them some love.
Crowbar is designed to securely retrieve temporary AWS credentials using its STS service, utilizing SAML as a means for authenticating and authorizing requests. Its unique feature is that it doesn't write any sensitive data (passwords, session tokens, security keys) to disk, but rather stores them in the operating system's keystore which requires the user's consent to have them retrieved from.
It is meant to be used with the AWS CLI's credential_process
capabilities, to provide a seamless experience when it comes to using AWS resources on the command line.
Crowbar is a fork of oktaws, written by Jonathan Morley, whereas the main differentiating factors for forking the original project were that it does write credentials to disk and it focuses solely on Okta. Both of these are not the intentions of this project.
For the time being, only Okta is supported as an IdP, with other providers (ADFS being prioritized the highest) to be added as soon as capacity allows.
Crowbar's name was formerly used by an AWS Lambda runtime for Rust emulating a Python library prior to native runtime support in Lambda. Crowbar 0.1.x and 0.2.x users should move to the native runtime.
There are a some things still left to do:
Add anexec
mode for tools that don't support the AWS SharedProfileCredentials provider- Support for at least ADFS: As stated before, crowbar is supposed to be a general purpose tool, not just focusing on Okta. ADFS support is mandatory.
However, other providers should be considered as well. The code will probably need major re-architecting for this to happen. - Support for WebAuthn: At least Okta supports WebAuthn on the command line and this tool should support it too. This largely depends on the maturity of the Rust ecosystem around handling FIDO2 security keys though. CTAP2 protocol support is mandatory to work with Okta.
Focus on cross-platform support: I'm running Linux, all of the code being tested on Linux. I want crowbar to be usable on all major operating systems (Linux, macOS, Windows).
- Cleaning up the code: This is my first major Rust project, and it shows. The code needs a few other pair of eyes with some more Rust experience.
- Implement some retry logic for MFA challenges? At least the Okta API allows for it in certain conditions
Error handling is all over the place, including randompanic!
statements and inconsistent logger use. The project needs a proper error handling routine.Use a role directly if only a single role is provided in the SAML assertionMore consistent UI experience (maybe start looking at other libraries?)