Granted – The easiest way to access AWS cli multiple accounts

Managing multiple accounts and maintaining security can become a considerable challenge in the increasingly complex world of Amazon Web Services (AWS). This is where Granted is a tool changing the game for DevOps/SRE professionals and developers. If you’ve ever found yourself struggling with complicated logins or lost in a sea of credentials, get ready to discover how Granted simplifies access to AWS, making Single Sign-On (SSO) and managing multiple accounts as easy as one click, greatly enhancing your AWS experience.

image 5

What is Granted?

Granted is a command line interface (CLI) application that simplifies access to cloud functions and allows multiple cloud accounts(aws cli multiple accounts) to be opened in your web browser simultaneously and/or via terminal.

Granted’s objectives are:

  • Provide a fast experience for finding and assuming roles.
  • Take advantage of the browser’s native functionality to allow multiple accounts to be accessed at once, identifying tabs by color.
  • Encrypt cached credentials to prevent plaintext SSO tokens from being saved to disk.

Summary – Using Granted

Before continuing to write this article, I would like to show in a few images how simple it is to use Granted and how much it makes SRE’s life easier, because when speaking conceptually, it is not possible to immediately see how much this tool helps. day to day.

I will bring 2 examples, considering the use of Granted for the terminal context and for accessing AWS accounts in the Browser in separate tabs, without the need to log out/log in with each access.

Assuming a role in the terminal context

Run the assume command and choose the role that will be assumed:

image

Message confirming that the role was successfully assumed:

image 1

From this, the commands executed in the terminal will be applied to the desired account. Running a command to confirm:

image 2

Assuming a role and opening the aws cli multiple accounts in the Browser

Just as we open an account and assume a role in the terminal context, we can use the command assume -c, it lists the roles that we can assume and opens a separate and colored tab in the desired AWS account, allowing us to work with several tabs, across multiple accounts, in a super simple way.

The first step is to run the command assume -c

image 3

After choosing the desired role/account, Granted will call the Browser and open the AWS page in the desired account:

aws cli multiple accounts

Each role assumed will adopt a different tab color in Firefox.

What does Granted work with?

Operational systems

Granted supports MacOS, Linux and Windows. Windows support is less extensively tested than other platforms.

Granted currently supports access to roles in AWS. If you would like to see support for another cloud provider, please open an issue!

Supported browsers

Granted currently supports Firefox, Chromium-based browsers (such as Chrome, Brave, and Edge), Safari, Arc, and Waterfox.

Important tip

We recommend using Firefox with Granted as it offers the best user experience when accessing multiple cloud consoles, even if it’s not your daily driver browser. In Firefox, Granted uses multi-account containers to view multiple cloud accounts. Multiple cloud accounts can be opened in the same window and are color-coded for easy reference.

To use Granted with Firefox, you will need to download the Firefox add-on. The extension requires minimal permissions and does not have access to web page content. You can read more about security considerations for the extension here. In Chromium-based browsers, Granted uses profiles. Each cloud account opens in a separate window.

Why Granted helps in a multi-account scenario

In the cloud computing domain, adopting best practices often leads cloud professionals to adopt multi-account environments. However, managing and navigating resources across multiple accounts can present challenges, especially when cross-referencing or monitoring logs. The AWS console, a valuable tool for viewing cloud resources, can become cumbersome in these scenarios, allowing access to only one account and region at a time, per browser session.

Recognizing this pain point, the development of Granted emerged as a solution to enhance the multi-account cloud experience. Instead of abandoning the native console and opting for custom abstractions, Granted recognizes the usefulness of the console and aims to make it a more effective tool for cloud professionals.

One of the driving factors behind the creation of Granted was the differentiated handling of session credentials by the AWS CLI when using AWS SSO (Single Sign-On). Although AWS SSO eliminates the need for long-running IAM credentials, the AWS CLI stores the SSO access token in plain text, posing a potential security risk. In contrast, Granted offers a notable improvement in this aspect. It securely stores the SSO access token in system keychain rather than on disk, providing an additional layer of protection and ease of revoking the token in the event of compromise.

At the company Common Fate, Granted was integrated into daily cloud access routines, where they achieved a significant increase in productivity. By simplifying resource management across multiple accounts and addressing security concerns related to SSO access tokens, Granted has proven to be a valuable asset for cloud operations.

Granted stands out as a tool designed to empower cloud professionals in multi-account environments. Its emphasis on improving the native console experience and enhancing security features, especially in the context of AWS SSO, makes it a notable choice for those looking to optimize their cloud workflows without sacrificing convenience or security. Elevate your cloud experience with Granted and unlock new levels of efficiency and confidence in managing your cloud resources.

Installation

The best way to take advantage and use granted is to install it via asdf.

If you have never used asdf, here is support material: https://asdf-vm.com/guide/getting-started.html

asdf install granted latest
asdf global granted 0.20.6  # ⬇️

# latest version at the time this manual is written,
# adjust to your version after install with latest

# adjust the alias for assume
## bash/zsh
echo "alias assume='source \$(asdf which assume)'"|tee -a ~/.zshrc ~/.bashrc 

## fish
echo "alias assume='source (asdf which assume).fish'"|tee -a ~/.config/fish/config.fish

Recommendations

Settings

After installing granted using asdf you should have received a message to add an alias for a utility called assume. To set the same:

# create the directory for the aws config if it doesn't already exist
mkdir -p ~/.aws

# makes a backup if the file already exists
[ -f ~/.aws/config ] && mv ~/.aws/config ~/.aws/config.bkp.$(date '+%Y%m%d')
touch ~/.aws/config

# generate the ~/.aws/config file with the existing SSO credentials
granted sso populate --sso-region us-east-1 https://devopsmind.awsapps.com/start#/

# Your browser window will open to authenticate to AWS
# Provide credentials and click Allow to authorize
# and the file ~/.aws/config# will be created

Extra adjustments

  • Add the required credentials to the default regions. In this case we will add the config to the profiles:
    • [profile Fernando-teste/...]
    • [profile devops-mind-producao/...]
  • After the last line of each of these profiles, add the following configuration (to leave the São Paulo region. Ac adjustment
    • region = sa-east-1

Assuming credentials

  • It is important that during the installation stage you created the alias to assume during installation.
  • Whenever you run assume without any parameters, AFTER the initial setup, you will be offered to choose which profile to use.

Initial Setup

image

assume – in the terminal

  • Assuming credentials:
ubuntu@devops-mind:~$ assume

? Please select the profile you would like to assume: Fernando-Teste/Administrator                 
[i] To assume this profile again later without needing to select it, run this command:
> assume Fernando-Teste/Administrator 
[i] If the browser does not open automatically, please open this link: https://device.sso.us-east-1.amazonaws.com/?user_code=PSBX-RTFW
[i] Awaiting AWS authentication in the browser
[i] You will be prompted to authenticate with AWS in the browser, then you will be prompted to 'Allow'
[i] Code: PSBX-RTFW

[✔] [Fernando-Teste/Administrator](sa-east-1) session credentials will expire in 12 hours
  • Using credentials with awscli:
ubuntu@devops-mind:~/Downloads/test-asdf$ aws eks list-clusters
{
    "clusters": [
        "eks-producao"
    ]
}
  • Using credentials to generate ~/.kube/config
ubuntu@devops-mind:~/Downloads/test-asdf$ assume Fernando-Teste/Administrator
ubuntu@devops-mind:~/Downloads/test-asdf$ aws eks --region us-east-1 update-kubeconfig --name eks-producao --alias eks-producao
[✔] [Fernando-Teste/Administrator](sa-east-1) session credentials will expire in 12 hours
Added new context eks-producao to /home/ubuntu/.kube/config

ubuntu@devops-mind:~/Downloads/test-asdf$ kubectl get nodes
NAME                            STATUS   ROLES    AGE    VERSION
ip-172-28-0-56.ec2.internal     Ready    <none>   47h    v1.21.14-eks-48e63af
ip-172-28-31-112.ec2.internal   Ready    <none>   2d4h   v1.21.14-eks-48e63af
ip-172-28-46-176.ec2.internal   Ready    <none>   2d4h   v1.21.14-eks-48e63af

assume – in the browser (console)

  • Opening a browser tab for the Fernando-Teste/Administrator account:
ubuntu@devops-mind:~/Downloads/test-asdf$ assume -c Fernando-Teste/Administrator
[i] use -s to open a specific service ( https://docs.commonfate.io/granted/usage/console )
[i] Opening a console for Fernando-Teste/Administrator in your browser...
  • If this is your first use, you may be asked which handler you want to operate with. Remember to check the options:
    • Open links in Granted Containers
    • Alwyas use this application to open ext+granted-containers links
    • Open Link
image 1
image 2
  • Opening a tab in the browser for the devops-mind-producao/Administrator account directly in the RDS service
ubuntu@devops-mind:~/Downloads/test-asdf$ assume -c devops-mind-producao/Administrator -s rds
[i] Opening a console for devops-mind-producao/Administrator in your browser...
image 4

With this, we can open different tabs, in different accounts, without the need to switch between accounts in a more time-consuming way.

More tips:

https://devopsmind.com.br/en/category/cloud-en

Troubleshooting

In this example below I bring a case where a Granted installation had problems on a MacOS machine.

Assumes asking to add alias to shell profile – Configuration with ZSH + Homebrew + MacOS

Problem

When executing the assume command, it displays the message to configure the alias, instead of the command being executed normally.

Verified that there is an alias in the .zshenv file:

                                                                                                                                                                                                                                                                                  ░▒▓ ✔  10:25:32  ▓▒░
░▒▓    ~ ▓▒░ assume                                                                                                                                                                                                                                                                               ░▒▓ ✔  10:25:32  ▓▒░
[i] To assume roles with Granted, we need to add an alias to your shell profile (https://docs.commonfate.io/granted/internals/shell-alias)
? Install zsh alias at /Users/fernando/.zshenv Yes

[✔] Added the Granted alias to /Users/fernando/.zshenv
[!] Shell restart required to apply changes: please open a new terminal window and re-run your command.
░▒▓    ~ ▓▒░ tail /Users/fernando/.zshenv                                                                                                                                                                                                                                     ░▒▓ ✔  15s   10:25:48  ▓▒░

alias assume=". assume"
░▒▓    ~ ▓▒░                                                                                                                                                                                                                                                                                      ░▒▓ ✔  10:25:56  ▓▒░
░▒▓    ~ ▓▒░

Solution

It is necessary to modify the .zshenv file, commenting the alias line.

Leave the alias only in ~/.zshrc

                                                                                                                                                                                                                                                                             ░▒▓ ✔  10:31:16  ▓▒░
░▒▓    ~ ▓▒░ tail ~/.zshrc                                                                                                                                                                                                                                                                        ░▒▓ ✔  10:31:16  ▓▒░
# For a full list of active aliases, run `alias`.
#
# Example aliases
# alias zshconfig="mate ~/.zshrc"
# alias ohmyzsh="mate ~/.oh-my-zsh"

# To customize prompt, run `p10k configure` or edit ~/.p10k.zsh.
[[ ! -f ~/.p10k.zsh ]] || source ~/.p10k.zsh
. /opt/homebrew/opt/asdf/libexec/asdf.sh
alias assume='source $(asdf which assume)'
░▒▓    ~ ▓▒░

Additional Resources

  1. Granted
  2. What is SSO (Single-Sign-On)?
  3. Granted documentation

Conclusion

In a world where efficient and secure cloud account management is crucial to the success of IT operations, Granted stands out as the ideal solution for AWS SSO Login and multiple account management. Through its intuitive interface and robust functionalities, Granted simplifies the authentication and access process, eliminating the complexity often associated with managing multiple AWS accounts.

Additionally, the enhanced security that Granted offers ensures that your credentials and sensitive data are always protected, allowing IT teams to focus on their core tasks without worrying about potential vulnerabilities. The ability to centrally automate and manage access permissions not only improves operational efficiency, but also significantly reduces the risk of human error.

In short, by incorporating Granted into your AWS account management strategy, you’ll be taking a modern, efficient approach that optimizes access, strengthens security, and promotes more effective account management. Whether for small businesses or large enterprises, Granted offers a scalable and reliable solution that meets the diverse and dynamic needs of today’s cloud environment.

Want to know more?

Did you like the article? Don’t forget to sign up for our newsletter to receive the latest news and tips about DevOps/SRE directly to your email. Also, read our other AWS posts to continue improving your DevOps skills.

Compartilhe / Share
Fernando Müller Junior
Fernando Müller Junior

I am Fernando Müller, a Tech Lead SRE with 16 years of experience in IT, I currently work at Appmax, a fintech located in Brazil. Passionate about working with Cloud Native architectures and applications, Open Source tools and everything that exists in the SRE world, always looking to develop and learn constantly (Lifelong learning), working on innovative projects!

Articles: 44

Receba as notícias por email / Receive news by email

Insira seu endereço de e-mail abaixo e assine nossa newsletter / Enter your email address below and subscribe to our newsletter

Leave a Reply

Your email address will not be published. Required fields are marked *