saml2aws icon indicating copy to clipboard operation
saml2aws copied to clipboard

failure to gain credentials from Azure when it is the Saml source for multiple AWS accounts

Open aflatto opened this issue 1 year ago • 2 comments

I am working with Azure AD ad the SSO SAML authentication for multiple AWS accounts. I do not see an option to specify which role and account i want to gain the credentials to. Without it the tool is unable to determine which account to generate the key pair:

./saml2aws list-roles --verbose DEBU[0000] Running command=list-roles Using IdP Account default to access AzureAD https://account.activedirectory.windowsazure.com To use saved password just hit enter. ? Username assaf@xxxxxxxio ? Password ***************

DEBU[0009] building provider command=list idpAccount="account {\n AppID: XXXXXXXXX-5XXb-4XX-9XXX-XXXXXXXXXXXX\n URL: https://account.activedirectory.windowsazure.com\n Username: [email protected]\n Provider: AzureAD\n MFA: PhoneAppNotification\n SkipVerify: false\n AmazonWebservicesURN: urn:amazon:webservices\n SessionDuration: 3600\n Profile: saml\n RoleARN: \n Region: \n}" DEBU[0010] processing ConvergedSignIn provider=AzureAD DEBU[0010] HTTP Req URL="https://login.microsoftonline.com/common/GetCredentialType?mkt=en-US" http=client method=POST DEBU[0010] HTTP Res Status="200 OK" http=client DEBU[0010] HTTP Req URL="https://login.microsoftonline.com/common/login" http=client method=POST DEBU[0011] HTTP Res Status="200 OK" http=client DEBU[0011] processing ConvergedTFA provider=AzureAD DEBU[0011] HTTP Req URL="https://login.microsoftonline.com/common/SAS/BeginAuth" http=client method=POST DEBU[0012] HTTP Res Status="200 OK" http=client Phone approval required. Entropy is: XX DEBU[0012] HTTP Req URL="https://login.microsoftonline.com/common/SAS/EndAuth" http=client method=POST DEBU[0034] HTTP Res Status="200 OK" http=client DEBU[0034] processing KmsiInterrupt provider=AzureAD DEBU[0034] HTTP Req URL="https://login.microsoftonline.com/kmsi" http=client method=POST DEBU[0034] HTTP Res Status="200 OK" http=client DEBU[0034] processing a 'hiddenform' provider=AzureAD DEBU[0034] HTTP Req URL="https://launcher.myapps.microsoft.com/api/signin-oidc" http=client method=POST DEBU[0035] HTTP Res Status="404 Not Found" http=client DEBU[0035] reached an unknown page within the authentication process provider=AzureAD failed get SAMLAssertion github.com/versent/saml2aws/v2/pkg/provider/aad.(*Client).Authenticate github.com/versent/saml2aws/v2/pkg/provider/aad/aad.go:221 github.com/versent/saml2aws/v2/cmd/saml2aws/commands.ListRoles github.com/versent/saml2aws/v2/cmd/saml2aws/commands/list_roles.go:66 main.main ./main.go:203 runtime.main runtime/proc.go:271 runtime.goexit runtime/asm_amd64.s:1695 error authenticating to IdP github.com/versent/saml2aws/v2/cmd/saml2aws/commands.ListRoles github.com/versent/saml2aws/v2/cmd/saml2aws/commands/list_roles.go:68 main.main ./main.go:203 runtime.main runtime/proc.go:271 runtime.goexit runtime/asm_amd64.s:1695

The application should have an option to specify the aws account ID to assign the token for ./saml2aws --role=XXXX --region=us-east-1 --accountid=123456789

aflatto avatar Nov 21 '24 08:11 aflatto

I noticed i forgot to mention the version so: ./saml2aws --version 2.36.18

aflatto avatar Nov 25 '24 05:11 aflatto

Hey, I also need this feature works.

lukashov-org avatar Dec 08 '24 08:12 lukashov-org