Releases: RedVentures/oktad
Releases · RedVentures/oktad
v0.8.0
- store your okta username and password in the keychain [thanks @tlunter for implementing]
- try to use your username as the "sessionName" in the final
AssumeRole
; helps identify users in CloudTrail, for one
v0.7.0
- adds keychain support for AWS credentials and okta session token, which means you no longer need to log in every time you need to switch to a new AWS account
Huge thanks to @lstanden for adding keychain support!
v0.6.2
- allow ARNs from SAML to come in either order
v0.6.1
- fixes a bug where having a directory named
.okta
in your CWD would render this program unusable
v0.6.0
This release adds support for running just the first AssumeRole, which means you can run commands (or whatever) inside your base account as well. This means commands such as oktad aws ec2 describe-instances
will work: if oktad
fails to find an AWS profile in your arguments, it will, for now, assume you only want to AssumeRole into the account authorized through your Okta SAML assertion.
v0.5.2
This release fixes a bug that would put nul bytes at the beginning of the JSON temporary credential store.
and also burns a version number because I forgot to update it in the program. hey!
v0.5.0
This is the first release of this program. Its initial featureset is complete but it needs some polish before I feel okay calling it v1.0.0.