Releases: onelogin/onelogin-python-aws-assume-role
Releases · onelogin/onelogin-python-aws-assume-role
v1.4.5
- Add password CLI option
- Add --aws-account-id and --aws-role-name parameters.
- Fix bug detected on the Protect MFA use. When PUSH Manual is used, get_saml_assertion_verifying must contain do_not_notify=True
- Include 'aws_session_expiration' and 'aws_security_token' as part of AWS cred.
v1.4.4
v1.4.3
v1.4.2
v1.4.1
v1.4.0
- Introduce Interactive mode (-x).
- Refactor how MFA is processed., Refactor iterations.
- Support SMS Token, Support OneLogin Protect Push.
- Improve UX: Catch Errors and let the script recover.
- Add -z --duration parameter to allow set AWS Credentials Session Duration, previously fixed to 3600s (that is now the default value if not parameter set).
- Replace deprecated optparse by argparse.
v1.3.0
v1.2.1
v1.2.0
- #10 Be able to provide ip_address parameter to bypass MFA
- #7 Fix Credential writer.
- Improve error handler: Detect when OL API Key data is wrong on initialization and detect when get_saml_assertion returns 400 or 401 and try to get new input when possible.
- Update dependencies: OneLogin Python SDK and Boto3
v1.1.0
changelog:
- Avoid the use of .text directly to get node value. Instead remove comments before.
- Add ability to specify AWS region via argument too
- Select MFA device automatically if there is only one
- Add ability to specify username, app ID and subdomain via command-line
- Fixed issue with string concatenation because of int