Describe the bug
We are using IAM Roles for access to our production environment which can be assumed by certain users.
My user is able to assume the role and has MFA configured. I configured leapp with a chained role with my iam user as the source.
I have to provide an MFA code to start a session for the chained role but when I open the web UI an alarm of us is triggered (whenever someone logs into the account without MFA).
The alarm is intended to follow the CIS Guidelines for AWS, especially CIS.3.2
I inspected the event and saw that the event data shows: userIdentify.attributes.mfaAuthenticated: false.
Leapp Version
Version 0.11.0 (0.11.0)
To Reproduce
Steps to reproduce the behavior:
Have a IAM user with MFA configured and a role to assume
Start session for the chained role and provide MFA Token
Open Web UI for this role
Event with userIdentify.attributes.mfaAuthenticated: false will show up in cloudtrail
Expected behavior
Event should have userIdentify.attributes.mfaAuthenticated set to true
Screenshots
JSON message of the event that triggers the event
I looked up the issue myself and found out that MFA is not supported when using the federation endpoint.
Regarding this information, this issue will be closed, since it's not a problem of leapp.
Describe the bug We are using IAM Roles for access to our production environment which can be assumed by certain users. My user is able to assume the role and has MFA configured. I configured leapp with a chained role with my iam user as the source. I have to provide an MFA code to start a session for the chained role but when I open the web UI an alarm of us is triggered (whenever someone logs into the account without MFA). The alarm is intended to follow the CIS Guidelines for AWS, especially CIS.3.2
I inspected the event and saw that the event data shows: userIdentify.attributes.mfaAuthenticated: false.
Leapp Version Version 0.11.0 (0.11.0)
To Reproduce Steps to reproduce the behavior:
Expected behavior Event should have userIdentify.attributes.mfaAuthenticated set to true
Screenshots JSON message of the event that triggers the event
Desktop (please complete the following information):