Skip to content

Commit 53b7e3d

Browse files
committed
Documentation updates.
1 parent 9315f38 commit 53b7e3d

File tree

2 files changed

+32
-43
lines changed

2 files changed

+32
-43
lines changed

README.md

+30-42
Original file line numberDiff line numberDiff line change
@@ -1,75 +1,63 @@
11
# aws-rotate-key
22

3-
As a security best practice, AWS recommends that administrators require
4-
IAM users to periodically [regenerate their API access keys](http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html#Using_RotateAccessKey).
5-
This `aws-rotate-key` tool allows users to easily rotate all of the AWS access keys defined in their local
6-
[aws credentials file](http://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html#cli-multiple-profiles).
7-
8-
The program will use the AWS API to check which access keys exist
9-
for the provided profile. If only one access key exists, then it will
10-
deactivate that key and update your credentials file to use a newly
11-
generated key. The old key will only be deactivated (**not** deleted),
12-
so that if you later find out you use the old key elsewhere, you
13-
can open the AWS console and reactivate it. If two access keys exist,
14-
then you will be asked whether you want to delete the key which is
15-
not currently configured in your credentials file to create an empty
16-
slot for the key rotation. Then, it will perform the same key rotation
17-
logic on the remaining key.
3+
As a security best practice, AWS recommends that users periodically
4+
[regenerate their API access keys](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html#Using_RotateAccessKey).
5+
This tool simplifies the rotation of access keys defined in your
6+
[credentials file](https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html#cli-multiple-profiles).
187

8+
When run, the program will list the current access keys associated with your
9+
IAM user, and print the steps it has to perform to rotate them.
10+
It will then wait for your confirmation before continuing.
1911

2012
## Usage
21-
Usage of aws-rotate-key:
13+
2214
```
15+
$ aws-rotate-key --help
16+
Usage of aws-rotate-key:
17+
-d Delete old key without deactivation.
2318
-profile string
2419
The profile to use. (default "default")
2520
-version
26-
Print version number (1.0.4)
27-
-y
28-
Automatic "yes" to prompts.
29-
-d
30-
Delete old key without deactivation.
31-
21+
Print version number
22+
-y Automatic "yes" to prompts.
3223
```
3324

3425
## Example
3526

3627
```
37-
$ aws-rotate-key --profile primary
38-
Using access key A123 from profile "primary".
39-
Your user ARN is: arn:aws:iam::123456789012:user/someone
28+
$ aws-rotate-key --profile work
29+
Using access key AKIAJMIGD6UPCXCFWVOA from profile "work".
30+
Your user ARN is: arn:aws:iam::123456789012:user/your_username
4031
4132
You have 2 access keys associated with your user:
42-
- A123 (Inactive, created 2015-01-01 02:55:00 +0000 UTC, last used 2016-01-01 00:02:00 +0000 UTC for service sts in us-east-1)
43-
- B123 (Active, created 2016-01-01 00:02:47 +0000 UTC, last used 2016-01-01 00:03:00 +0000 UTC for service s3 in N/A)
33+
- AKIAI3KI7UC6BPI4O57A (Inactive, created 2018-11-22 21:47:46 +0000 UTC, last used 2018-11-30 20:35:41 +0000 UTC for service s3 in us-west-2)
34+
- AKIAJMIGD6UPCXCFWVOA (Active, created 2018-11-30 21:55:57 +0000 UTC, last used 2018-12-20 12:14:10 +0000 UTC for service s3 in us-west-2)
4435
4536
You have two access keys, which is the max number of access keys.
46-
Do you want to delete A123 and create a new key? [yN] y
47-
Deleted access key A123.
48-
Created access key C123.
49-
Wrote new key pair to /Users/someone/.aws/credentials
50-
Deactivated old access key B123.
37+
Do you want to delete AKIAI3KI7UC6BPI4O57A and create a new key? [yN] y
38+
Deleted access key AKIAI3KI7UC6BPI4O57A.
39+
Created access key AKIAIX46CKYT7E5I3KVQ.
40+
Wrote new key pair to /Users/your_username/.aws/credentials
41+
Deactivated old access key AKIAJMIGD6UPCXCFWVOA.
5142
Please make sure this key is not used elsewhere.
43+
Please note that it may take a minute for your new access key to propagate in the AWS control plane.
5244
```
5345

5446
## Install
5547

56-
You can download the 64-bit binaries from
57-
[the releases section](https://github.com/Fullscreen/aws-rotate-key/releases/latest)
58-
of this repository.
48+
You can download binaries from [the releases section](https://github.com/Fullscreen/aws-rotate-key/releases/latest).
5949

60-
Or, you can use our homebrew tap on OSX:
50+
You can also use our Homebrew tap on macOS:
6151

6252
```
63-
brew tap fullscreen/tap
64-
brew install aws-rotate-key
65-
aws-rotate-key
53+
brew install fullscreen/tap/aws-rotate-key
6654
```
6755

6856
## Setup
6957

70-
Make sure your users have permissions to update their own access keys via the CLI. The AWS
71-
documentation [here](http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_delegate-permissions_examples.html#creds-policies-credentials)
72-
explains the required permissions and the following IAM profile should get you setup:
58+
Make sure your users have permissions to update their own access keys. The following AWS documentation page explains the required permissions: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_delegate-permissions_examples.html#creds-policies-credentials.
59+
60+
The following IAM policy is enough for aws-rotate-key:
7361

7462
```json
7563
{

main.go

+2-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ func main() {
2727
flag.BoolVar(&yesFlag, "y", false, `Automatic "yes" to prompts.`)
2828
flag.BoolVar(&deleteFlag, "d", false, "Delete old key without deactivation.")
2929
flag.StringVar(&profileFlag, "profile", "default", "The profile to use.")
30-
flag.BoolVar(&versionFlag, "version", false, "Print version number ("+version+")")
30+
flag.BoolVar(&versionFlag, "version", false, "Print version number")
3131
flag.Parse()
3232

3333
if versionFlag {
@@ -191,6 +191,7 @@ func main() {
191191
fmt.Printf("Deactivated old access key %s.\n", creds.AccessKeyID)
192192
fmt.Println("Please make sure this key is not used elsewhere.")
193193
}
194+
fmt.Println("Please note that it may take a minute for your new access key to propagate in the AWS control plane.")
194195
}
195196

196197
func pluralize(n int) string {

0 commit comments

Comments
 (0)