All Projects → tilfinltd → Aws Extend Switch Roles

tilfinltd / Aws Extend Switch Roles

Licence: mit
Extend your AWS IAM switching roles by Chrome extension, Firefox add-on, or Edge add-on

Programming Languages

javascript
184084 projects - #8 most used programming language

Projects that are alternatives of or similar to Aws Extend Switch Roles

Awsconsolerecorder
Records actions made in the AWS Management Console and outputs the equivalent CLI/SDK commands and CloudFormation/Terraform templates.
Stars: ✭ 1,152 (+33.64%)
Mutual labels:  aws, chrome-extension, firefox-addon
Web Search Navigator
Chrome/Firefox extension that adds keyboard shortcuts to Google, YouTube, Github, Amazon, and others
Stars: ✭ 532 (-38.28%)
Mutual labels:  chrome-extension, firefox-addon
Markdown Viewer
Markdown Viewer / Browser Extension
Stars: ✭ 497 (-42.34%)
Mutual labels:  chrome-extension, firefox-addon
Chrome Utm Stripper
Browser extension that strips Google Analytics (UTM) parameters, and various other click tracking tokens, from URL query strings
Stars: ✭ 590 (-31.55%)
Mutual labels:  chrome-extension, firefox-addon
Gooreplacer
⚡️⚡️A browser extension to modify HTTP requests :-)
Stars: ✭ 850 (-1.39%)
Mutual labels:  chrome-extension, firefox-addon
Simpread
简悦 ( SimpRead ) - 让你瞬间进入沉浸式阅读的扩展
Stars: ✭ 5,352 (+520.88%)
Mutual labels:  chrome-extension, firefox-addon
Refined Bitbucket
Chrome and Firefox extension that improves Bitbucket's user experience
Stars: ✭ 560 (-35.03%)
Mutual labels:  chrome-extension, firefox-addon
Read Aloud
An awesome browser extension that reads aloud webpage content with one click
Stars: ✭ 444 (-48.49%)
Mutual labels:  chrome-extension, firefox-addon
Tab Session Manager
WebExtensions for restoring and saving window / tab states
Stars: ✭ 711 (-17.52%)
Mutual labels:  chrome-extension, firefox-addon
Saka Key
A keyboard interface to the web
Stars: ✭ 748 (-13.23%)
Mutual labels:  chrome-extension, firefox-addon
Tabliss
An extensible New Tab web extension written in TypeScript, React and Redux.
Stars: ✭ 798 (-7.42%)
Mutual labels:  chrome-extension, firefox-addon
Darkness
Dark Themes for Popular Websites
Stars: ✭ 467 (-45.82%)
Mutual labels:  chrome-extension, firefox-addon
Tracy
A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.
Stars: ✭ 464 (-46.17%)
Mutual labels:  chrome-extension, firefox-addon
Refined Hacker News
✨ Hacker News, but refined — Interface tweaks and features to make the HN experience better
Stars: ✭ 498 (-42.23%)
Mutual labels:  chrome-extension, firefox-addon
Tusk
🐘 🔒 KeePass-compatible browser extension for filling passwords.
Stars: ✭ 452 (-47.56%)
Mutual labels:  chrome-extension, firefox-addon
Npmhub
🔎 A browser extension to explore npm dependencies on GitHub repos
Stars: ✭ 542 (-37.12%)
Mutual labels:  chrome-extension, firefox-addon
Toggl Button
Toggl Button extension for Chrome and Firefox
Stars: ✭ 891 (+3.36%)
Mutual labels:  chrome-extension, firefox-addon
Security monkey
Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.
Stars: ✭ 4,244 (+392.34%)
Mutual labels:  aws, aws-iam
Auto Tab Discard
Use native tab discarding method to automatically reduce memory usage of inactive tabs
Stars: ✭ 441 (-48.84%)
Mutual labels:  chrome-extension, firefox-addon
Mmra
Make Medium Readable Again — a browser extension
Stars: ✭ 625 (-27.49%)
Mutual labels:  chrome-extension, firefox-addon

Dear my early donators and current supporters Golden Key

You have a ticket to get the AESR Golden Key code. If you have not got it yet, please contact me.

for my early donator via PayPal or Bitcoin

Please check To those who have donated before section of Supporters in the AESR pop-up menu of your browser.

for current supporters (GitHub Sponsors)

Please check Request for Contact Information in https://github.com/sponsors/tilfinltd.


AWS Extend Switch Roles

Chrome Web Store Firefox Add-on Edge Add-on

Extend your AWS IAM switching roles by Chrome extension, Firefox add-on, or Edge add-on

Switch roll history does not remain only 5 maximum on the AWS Management Console. This extension give you show all of switch roles from a browse menu by loading your aws configuration.

  • Supports Chrome Sync

Development and Distribution Guideline

Minimize required permissions and operating the page of Console

A browser plug-in goes with security risks. AWS Management Console allows you to manipulate your essential data.

Support the only latest version for each official build browser

It does not restrict the use of other compatible browsers. The version restrictions are based on JavaScript language features used.

Install

Configuration

Click Browser button, edit your profile settings to text area in popup form and save.

Supports ~/.aws/config format and like ~/.aws/credentials

Simple Configuration

The simplest configuration is for multiple target roles when you always intend to show the whole list. Target roles can be expressed with a role_arn or with both aws_account_id and role_name.

Optional parameters

  • color - The RGB hex value (without the prefix '#') for the color of the header bottom border and around the current profile.
  • region - Changing the region whenever switching the role if this parameter is specified.
  • image - The uri of an image to use on top of any color attribute supplied. The color and image are not mutually exclusive.
[profile marketingadmin]
role_arn = arn:aws:iam::123456789012:role/marketingadmin
color = ffaaee

[anotheraccount]
aws_account_id = 987654321987
role_name = anotherrole
region=ap-northeast-1

[athirdaccount]
aws_account_id = 987654321988
role_name = athirdrole
image = "https://via.placeholder.com/150"

Complex Configuration

More complex configurations involve multiple AWS accounts and/or organizations.

  • A profile that has only aws_account_id (without a role_name) is defined as base account.

  • If your account is aliased, the alias will be shown in the role dropdown after 'Account:'. You MUST use that alias as the aws_account_id for the base account instead of the numerical account id or your configuration won't work as expected.

  • A target role is associated with a base account by the target role specifying a source_profile.

  • As above, target roles can be expressed with a role_arn or with both aws_account_id and role_name and can optionally pass the optional parameters.

  • If target_role_name is set in base account, the value is provided as the default role name for each target roles.

  • If target_region is set in base account, the value is provided as the default region for each target roles.

[organization1]
aws_account_id = your-account-alias

[Org1-Account1-Role1]
role_arn = arn:aws:iam::123456789012:role/Role1
source_profile = organization1

[Org1-Account1-Role2]
aws_account_id = 123456789012
role_name = Role2
source_profile = organization1

[Org1-Account2-Role1]
aws_account_id = 210987654321
role_name = Role1
source_profile = organization1

[baseaccount2]
aws_account_id = 000000000000

[Base2-Role1]
role_arn = arn:aws:iam::234567890123:role/Role1
source_profile = baseaccount2

[AnotherRole]
role_name = SomeOtherRole
aws_account_id = account-3-alias

;
; target_role_name example
;
[Org2-BaseAccount]
aws_account_id = 222200000000
target_role_name = Developer

[Org2-Account1-Developer]
aws_account_id = 222200001111
source_profile = Org2-BaseAccount

[Org2-Account2-Manager]
aws_account_id = 222200002222
role_name = Manager ; overrides target role name
source_profile = Org2-BaseAccount

If you sign-in a base account, target roles of the other base accounts are excluded.

The 'Show only matching roles' setting is for use with more sophisticated account structures where you're using AWS Organizations with multiple accounts along with AWS Federated Logins via something like Active Directory or Google GSuite. Common practice is to have a role in the master account that is allowed to assume a role of the same name in other member accounts. Checking this box means that if you're logged in to the 'Developer' role in the master account, only member accounts with a role_arn ending in 'role/Developer' will be shown. You won't see roles that your current role can't actually assume.

Settings

  • Hide account id hides the account_id for each profile.
  • Show only matching roles filters to only show profiles with roles that match your role in your master account.
  • Automatically assume last assumed role (Experimental) automatically assumes last assumed role on the next sign-in if did not back to the base account and signed out. temporarily disabled
  • Configuration storage specifies which storage to save to. 'Sync' can automatically share it between browsers with your account but cannot store many profiles. 'Local' is the exact opposite of 'Sync.'

Extension API

  • Config sender extension allowed by the ID can send your switch roles configuration to this extension. 'Configuration storage' forcibly becomes 'Local' when the configuration is received from a config sender. See how to make your config sender extension.

Supporters

Classmethod, Inc.

Appearance

Screen Shot 1

Screen Shot 3

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].