The only version I support is the latest version of aws-sso
. Should a new
major version be released which is incompatible with v1.x, then this policy
will be updated at that time.
Please open a security ticket in GitHub.
If you believe the public visibility of the information of the bug would
place other aws-sso
users at risk, then you may email me at:
[email protected]
. GPG encrypting your email in those situations is
encouraged and you should use this GPG Key.
aws-sso
relies on 99designs/keyring
to store and retrieve secrets in 3rd party secure key stores which are
available on macOS, Windows, and Linux. The security of aws-sso
is
dependent on those systems.
AWS Identity Center security tokens are never exposed, however by design the AWS IAM credentials are typically exposed via a variety of means in order for them to be used by other processes. It is the user's responsibility to ensure that those credentials are handled appropriately based on their security threat model.
When running in ECS Server Mode (aws-sso ecs run
) an HTTP API will be
started on a TCP port bound to localhost. Loading and retrieving
IAM Role credentials from this server will happen in the clear without
any encryption or authentication. For this reason, it is not recommended
to be used on multi-tenant user systems or other untrusted environments.
Adding encryption and authentication are on the roadmap. If these security features are interesting to you please leave a comment.