Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: adding new CLD documentation related to new SSO login #1081

Merged
merged 1 commit into from
Nov 4, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
26 changes: 26 additions & 0 deletions _scicomputing/access_credentials.md
Original file line number Diff line number Diff line change
Expand Up @@ -65,6 +65,32 @@ Default output format [None]:
```
This will create the following files that store your credentials `~/.aws/config` & `~/.aws/credentials`

### Configure AWS CLI for Single Sign-on (SSO)
To access an AWS account using SSO authentication, a user signs in to the AWS access portal URL provided, IAM Identity Center redirects the request to an authentication service.

After authentication with a HutchNet ID, the user will have SSO access to all AWS account and applications without additional sign-in requirements (Username and Password)

##How to navigate to the AWS SSO Portal.
Key Steps:
* Access the SSO portal: Go to the unique SSO login URL: https://d-92674cb6d7.awsapps.com/start/#/?tab=accounts
* Sign in with Credentials: Enter your HutchID to authenticate following MFA authentication.
![MFA Screen](.//assets/CLD_PickAccount.png)
* Select AWS account: Once logged in, choose the AWS account you want to access from the list of available accounts. Expanding the arrow will show the account name, the sso-role attached to the user. Each user will see only the account it has access to and the role mapped to the user. PowerUserAccess is an example.
![AccountSelection](.//assets/CLD_LZALandingPage.png)
* Choose a role: Select the specific role assigned to you within the chosen AWS account. PowerUserAccess is a link and clicking the role will take you to the AWS account.
* Access AWS services: You can now access the AWS Management Console or use the AWS CLI with temporary credentials obtained from your SSO session.

## Using the AWS CLI with SSO:
# Configure SSO profile:
Use the command aws configure sso to set up your SSO profile locally on your machine.
https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html#cli-configure-sso-configure
# Login with SSO:
Run aws sso login in your terminal to initiate an SSO session and retrieve temporary credentials.
# Access AWS services:
Once logged in, use the AWS CLI commands as usual, utilizing the temporary credentials obtained through SSO.
# Important points to remember:
* Session duration: SSO session have a set expiration time, so you may need to re-authenticate periodically.

### Testing Your Credentials
To test your credentials to ensure that you have the correct permissions to your PI bucket, execute the following to copy a file from your local computer to your PI's bucket.

Expand Down
Binary file added _scicomputing/assets/CLD_LZALandingPage.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added _scicomputing/assets/CLD_PickAccount.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.