Skip to content
This repository has been archived by the owner on Apr 7, 2022. It is now read-only.

Releases: RedVentures/oktad

v0.8.0

06 Jun 18:31
Compare
Choose a tag to compare
  • store your okta username and password in the keychain [thanks @tlunter for implementing]
  • try to use your username as the "sessionName" in the final AssumeRole; helps identify users in CloudTrail, for one

v0.7.0

22 Mar 17:00
Compare
Choose a tag to compare
  • adds keychain support for AWS credentials and okta session token, which means you no longer need to log in every time you need to switch to a new AWS account

Huge thanks to @lstanden for adding keychain support!

v0.6.2

08 Dec 22:29
Compare
Choose a tag to compare
  • allow ARNs from SAML to come in either order

v0.6.1

15 Jun 10:39
Compare
Choose a tag to compare
  • fixes a bug where having a directory named .okta in your CWD would render this program unusable

v0.6.0

07 Jun 02:20
Compare
Choose a tag to compare

This release adds support for running just the first AssumeRole, which means you can run commands (or whatever) inside your base account as well. This means commands such as oktad aws ec2 describe-instances will work: if oktad fails to find an AWS profile in your arguments, it will, for now, assume you only want to AssumeRole into the account authorized through your Okta SAML assertion.

v0.5.2

18 May 21:32
Compare
Choose a tag to compare

This release fixes a bug that would put nul bytes at the beginning of the JSON temporary credential store.

and also burns a version number because I forgot to update it in the program. hey!

v0.5.0

18 May 16:47
Compare
Choose a tag to compare

This is the first release of this program. Its initial featureset is complete but it needs some polish before I feel okay calling it v1.0.0.