You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is there a configuration setting we can use to make the resultant session token expire in less than the default 12 hours? I know that's an option in get-session-token (using the --duration-seconds parameter) but can't figure out if this is possible when configuring AWSCLI to prompt for an MFA code.
If this is currently not possible, it would make a great new feature!
The text was updated successfully, but these errors were encountered:
There is not currently a way to set the duration-seconds of the call, but since under the hood we're using assume-role not get-session-token, the default duration is 1 hour rather than 12. I'm not sure that less than one hour is particularly useful, what do you think?
We are using IAM roles with CLI, as described in this article, by setting our
~/.aws/config
file to look something like this:Is there a configuration setting we can use to make the resultant session token expire in less than the default 12 hours? I know that's an option in
get-session-token
(using the--duration-seconds
parameter) but can't figure out if this is possible when configuring AWSCLI to prompt for an MFA code.If this is currently not possible, it would make a great new feature!
The text was updated successfully, but these errors were encountered: