Closed apate007 closed 1 month ago
This can be done using Keeper Secrets Manager Password Rotation with a PAM script attached.
This can be done using Keeper Secrets Manager Password Rotation with a PAM script attached.
Hi @Keeper-Eric, thank you for the response. This method does not work for our use case. Wrote this issue in hopes of requesting this as a feature for Keeper Commander since cross-account AWS Credential rotation is present for passwords only as part of the Keeper Secrets Manager Gui, but not for passwords or awskey rotation in Commander.
The Commander team will fix this issue in the next release.
The Commander team will fix this issue in the next release.
Thanks @sk-keeper!
The changes are in the release
branch.
awskey
password rotation plugin accepts a new parameter cmdr:aws_assume_role
If set then the plugin assumes this role prior to calling any iam access key method.
The Commander is going to be released this Friday.
Commander 16.11.15 has been released.
Commander 16.11.15 has been released.
This works as expected. Thanks for adding this so quickly @sk-keeper!
Wondering if this feature will be available in the future.
It appears that using commander running on EC2, the 'Login' field is used for finding the account in the iam::ListAccessKeys API call in keepercommander/plugins/awskey/aws_accesskey.py. While this works for same account API Calls, it does not work for cross account because the 'Distinguished Name' from the record containing the AWS arn is not used to find which account this record belongs to. I noticed however that cross account roles can be used for the in-GUI password rotation. I understand this could be a limitation caused by the IAM ListAccessKeys CLI command but it would be great to have the ability for cross account IAM Access Key rotation available while running Keeper Commander on an EC2 instance.
Associated error when using assume role to another account in coordination with the Commander
rotate xxxxx --plugin awskey
command: