|
1 | 1 | # aws-rotate-key
|
2 | 2 |
|
3 |
| -As a security best practice, AWS recommends that administrators require |
4 |
| -IAM users to periodically [regenerate their API access keys](http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html#Using_RotateAccessKey). |
5 |
| -This `aws-rotate-key` tool allows users to easily rotate all of the AWS access keys defined in their local |
6 |
| -[aws credentials file](http://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html#cli-multiple-profiles). |
7 |
| - |
8 |
| -The program will use the AWS API to check which access keys exist |
9 |
| -for the provided profile. If only one access key exists, then it will |
10 |
| -deactivate that key and update your credentials file to use a newly |
11 |
| -generated key. The old key will only be deactivated (**not** deleted), |
12 |
| -so that if you later find out you use the old key elsewhere, you |
13 |
| -can open the AWS console and reactivate it. If two access keys exist, |
14 |
| -then you will be asked whether you want to delete the key which is |
15 |
| -not currently configured in your credentials file to create an empty |
16 |
| -slot for the key rotation. Then, it will perform the same key rotation |
17 |
| -logic on the remaining key. |
| 3 | +As a security best practice, AWS recommends that users periodically |
| 4 | +[regenerate their API access keys](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html#Using_RotateAccessKey). |
| 5 | +This tool simplifies the rotation of access keys defined in your |
| 6 | +[credentials file](https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html#cli-multiple-profiles). |
18 | 7 |
|
| 8 | +When run, the program will list the current access keys associated with your |
| 9 | +IAM user, and print the steps it has to perform to rotate them. |
| 10 | +It will then wait for your confirmation before continuing. |
19 | 11 |
|
20 | 12 | ## Usage
|
21 |
| -Usage of aws-rotate-key: |
| 13 | + |
22 | 14 | ```
|
| 15 | +$ aws-rotate-key --help |
| 16 | +Usage of aws-rotate-key: |
| 17 | + -d Delete old key without deactivation. |
23 | 18 | -profile string
|
24 | 19 | The profile to use. (default "default")
|
25 | 20 | -version
|
26 |
| - Print version number (1.0.4) |
27 |
| - -y |
28 |
| - Automatic "yes" to prompts. |
29 |
| - -d |
30 |
| - Delete old key without deactivation. |
31 |
| -
|
| 21 | + Print version number |
| 22 | + -y Automatic "yes" to prompts. |
32 | 23 | ```
|
33 | 24 |
|
34 | 25 | ## Example
|
35 | 26 |
|
36 | 27 | ```
|
37 |
| -$ aws-rotate-key --profile primary |
38 |
| -Using access key A123 from profile "primary". |
39 |
| -Your user ARN is: arn:aws:iam::123456789012:user/someone |
| 28 | +$ aws-rotate-key --profile work |
| 29 | +Using access key AKIAJMIGD6UPCXCFWVOA from profile "work". |
| 30 | +Your user ARN is: arn:aws:iam::123456789012:user/your_username |
40 | 31 |
|
41 | 32 | You have 2 access keys associated with your user:
|
42 |
| -- A123 (Inactive, created 2015-01-01 02:55:00 +0000 UTC, last used 2016-01-01 00:02:00 +0000 UTC for service sts in us-east-1) |
43 |
| -- B123 (Active, created 2016-01-01 00:02:47 +0000 UTC, last used 2016-01-01 00:03:00 +0000 UTC for service s3 in N/A) |
| 33 | +- AKIAI3KI7UC6BPI4O57A (Inactive, created 2018-11-22 21:47:46 +0000 UTC, last used 2018-11-30 20:35:41 +0000 UTC for service s3 in us-west-2) |
| 34 | +- AKIAJMIGD6UPCXCFWVOA (Active, created 2018-11-30 21:55:57 +0000 UTC, last used 2018-12-20 12:14:10 +0000 UTC for service s3 in us-west-2) |
44 | 35 |
|
45 | 36 | You have two access keys, which is the max number of access keys.
|
46 |
| -Do you want to delete A123 and create a new key? [yN] y |
47 |
| -Deleted access key A123. |
48 |
| -Created access key C123. |
49 |
| -Wrote new key pair to /Users/someone/.aws/credentials |
50 |
| -Deactivated old access key B123. |
| 37 | +Do you want to delete AKIAI3KI7UC6BPI4O57A and create a new key? [yN] y |
| 38 | +Deleted access key AKIAI3KI7UC6BPI4O57A. |
| 39 | +Created access key AKIAIX46CKYT7E5I3KVQ. |
| 40 | +Wrote new key pair to /Users/your_username/.aws/credentials |
| 41 | +Deactivated old access key AKIAJMIGD6UPCXCFWVOA. |
51 | 42 | Please make sure this key is not used elsewhere.
|
| 43 | +Please note that it may take a minute for your new access key to propagate in the AWS control plane. |
52 | 44 | ```
|
53 | 45 |
|
54 | 46 | ## Install
|
55 | 47 |
|
56 |
| -You can download the 64-bit binaries from |
57 |
| -[the releases section](https://github.com/Fullscreen/aws-rotate-key/releases/latest) |
58 |
| -of this repository. |
| 48 | +You can download binaries from [the releases section](https://github.com/Fullscreen/aws-rotate-key/releases/latest). |
59 | 49 |
|
60 |
| -Or, you can use our homebrew tap on OSX: |
| 50 | +You can also use our Homebrew tap on macOS: |
61 | 51 |
|
62 | 52 | ```
|
63 |
| -brew tap fullscreen/tap |
64 |
| -brew install aws-rotate-key |
65 |
| -aws-rotate-key |
| 53 | +brew install fullscreen/tap/aws-rotate-key |
66 | 54 | ```
|
67 | 55 |
|
68 | 56 | ## Setup
|
69 | 57 |
|
70 |
| -Make sure your users have permissions to update their own access keys via the CLI. The AWS |
71 |
| -documentation [here](http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_delegate-permissions_examples.html#creds-policies-credentials) |
72 |
| -explains the required permissions and the following IAM profile should get you setup: |
| 58 | +Make sure your users have permissions to update their own access keys. The following AWS documentation page explains the required permissions: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_delegate-permissions_examples.html#creds-policies-credentials. |
| 59 | + |
| 60 | +The following IAM policy is enough for aws-rotate-key: |
73 | 61 |
|
74 | 62 | ```json
|
75 | 63 | {
|
|
0 commit comments