The only version I support is the latest version of aws-sso
. Should a new
major version be released which is incompatible with v2.x, then this policy
will be updated at that time.
Note: with the v2.x release, v1.x is no longer supported.
All commits by me are signed by my commit signing GPG key.
All releases have a corresponding detactched GPG signature using my code signing GPG key.
Please open a security ticket in GitHub.
If you believe the public visibility of the information of the bug would
place other aws-sso
users at risk, then you may email me at:
[email protected]
. GPG encrypting your email in those situations is
encouraged and you should use this GPG Key.
aws-sso
relies on 99designs/keyring
to store and retrieve secrets in 3rd party secure key stores which are
available on macOS, Windows, and Linux. The security of aws-sso
is
dependent on those systems.
AWS Identity Center security tokens are never exposed, however by design the AWS IAM credentials are typically exposed via a variety of means in order for them to be used by other processes. It is the user's responsibility to ensure that those credentials are handled appropriately based on their security threat model.
By default, running in ECS Server Mode (aws-sso ecs server
) an HTTP API will be
started on a TCP port bound to localhost. By default, loading and retrieving
IAM Role credentials from this server will happen in the clear without
any encryption or authentication For this reason, it is not recommended
to be used in this way on multi-tenant user systems or other untrusted environments.
Running the ECS Server in docker
(aws-sso ecs docker start
) will briefly expose your HTTP Authentication bearer token and
SSL private key in clear text in ~/.aws-sso/mnt/
. If you are running it on a system
where the root
user is not trusted, this may not be acceptable. In such cases, it
is recommended to run aws-sso ecs server
in a screen or tmux session.