-
Notifications
You must be signed in to change notification settings - Fork 259
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Difficult to find accounts when using in a large organization with many accounts and roles #27
Comments
Well, one useful extension would be to break the account IDs and role names apart into two selections. So you'd first pick the account, then pick the role within that account. If there is only one account the account question should be skipped. Ditto for the role. Then you could introduce your account ID alias feature to help identify the IDs. Would prefer to see both the account ID and alias (if it exists) in the selection. Not sure the best solution for requesting the input from the user in the config though... |
This sounds good. Maybe provide another CLI flag to manage the mapping?
Specifying a zero-length alias removes the mapping. This way we can distribute a file to users, and they can aws-azure-cli --profile my_company --account-alias $(cat file). Thoughts? |
If there's a way to not avoid going to this url, the page could be scraped to get the account aliases. |
You'd have to test to see if that would causes issues with using the claim twice. |
I'm surprised this issue has received so little attention. It's almost impossible to find the appropriate role with a large number of accounts - each with multiple roles. How could the list be broken down by account name or alias? The comments above seem outdated. If anyone has some good pointers I could potentially look into it myself to see what I can come up with. |
@stephenmuss, I think you can try to tweak https://github.com/sportradar/aws-azure-login/blob/main/src/login.ts#L869-L875 |
So far as I can tell, it's necessary to stop closing the browser before it loads https://signin.aws.amazon.com/saml and then scrape the account aliases from there. |
Is there any update on this issue? I'd be interested in seeing the linked PR merged to resolve this. |
After logging in, when selecting a role from the list, it is inconvenient to navigate by account ID and role alone. My organization has the same roles in dozens of accounts.
I'd like to offer a feature that can display an alias in the enumeration in addition to/replacement of the account ID. Is there a particular implementation approach that you would recommend, before I patch something in?
The text was updated successfully, but these errors were encountered: