cyberark / SkyArk

SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS
MIT License
872 stars 160 forks source link

Added possibility to also use session credentials for AWStealth Scan #8

Closed stefankober closed 4 years ago

stefankober commented 4 years ago

Hi Hechtov! This change is useful for example for federated AWS environments, where you only can assume roles via sts after login. If you use the script as is, you get an error about an invalid session token. I tested both cases (login user/sts session) locally, both worked for me. Thanks for this script! Very helpful

stefankober commented 4 years ago

Just saw that this will fix https://github.com/cyberark/SkyArk/issues/7

Hechtov commented 4 years ago

@stefankober thanks for your help, great contribution. I will take a look at this and merge the changes. Indeed, it will be nice to be able to run AWStealth by using assumed roles, I also had this feature in my backlog. Well done and thanks.