Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Difficult to find accounts when using in a large organization with many accounts and roles #27

Open
rodgersTR opened this issue Mar 23, 2018 · 8 comments · May be fixed by #151
Open

Difficult to find accounts when using in a large organization with many accounts and roles #27

rodgersTR opened this issue Mar 23, 2018 · 8 comments · May be fixed by #151

Comments

@rodgersTR
Copy link

After logging in, when selecting a role from the list, it is inconvenient to navigate by account ID and role alone. My organization has the same roles in dozens of accounts.

I'd like to offer a feature that can display an alias in the enumeration in addition to/replacement of the account ID. Is there a particular implementation approach that you would recommend, before I patch something in?

@dtjohnson
Copy link
Contributor

Well, one useful extension would be to break the account IDs and role names apart into two selections. So you'd first pick the account, then pick the role within that account. If there is only one account the account question should be skipped. Ditto for the role. Then you could introduce your account ID alias feature to help identify the IDs. Would prefer to see both the account ID and alias (if it exists) in the selection. Not sure the best solution for requesting the input from the user in the config though...

@rodgersTR
Copy link
Author

rodgersTR commented Apr 2, 2018

This sounds good. Maybe provide another CLI flag to manage the mapping?

--profile ... --account-alias "<accountnum>=<alias>,<accountnum>=<alias>"

Specifying a zero-length alias removes the mapping. This way we can distribute a file to users, and they can aws-azure-cli --profile my_company --account-alias $(cat file).

Thoughts?

@advancemh
Copy link

If there's a way to not avoid going to this url, the page could be scraped to get the account aliases.

@dtjohnson
Copy link
Contributor

You'd have to test to see if that would causes issues with using the claim twice.

@stephenmuss
Copy link

I'm surprised this issue has received so little attention. It's almost impossible to find the appropriate role with a large number of accounts - each with multiple roles. How could the list be broken down by account name or alias? The comments above seem outdated. If anyone has some good pointers I could potentially look into it myself to see what I can come up with.

@kennethaasan
Copy link
Collaborator

@stephenmuss
Copy link

So far as I can tell, it's necessary to stop closing the browser before it loads https://signin.aws.amazon.com/saml and then scrape the account aliases from there.

@stephenmuss stephenmuss linked a pull request Oct 3, 2020 that will close this issue
@bforbis
Copy link

bforbis commented Dec 14, 2020

Is there any update on this issue? I'd be interested in seeing the linked PR merged to resolve this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

6 participants