AWS Extend Switch Roles
Item media 2 screenshot
Item media 1 screenshot
Item media 2 screenshot
Item media 1 screenshot
Item media 1 screenshot
Item media 2 screenshot

Overview

Extend your AWS IAM switching roles. You can set the configuration like aws config format

Switch role history does not remain only five maximum on the AWS Management Console. This extension gives you show all of switch roles from a browse menu by loading your aws configuration. ## Configuration ### Simple Configuration The simplest configuration is for multiple **target roles** when you always intend to show the whole list. **Target roles** can be expressed with a `role_arn` or with both `aws_account_id` and `role_name`. #### Optional parameters * `color` - The RGB hex value (without the prefix '#') for the color of the header bottom border and around the current profile. * `region` - Changing the region whenever switching the role if this parameter is specified. * `image` - The uri of an image to use on top of any color attribute supplied. The color and image are not mutually exclusive. ``` [profile marketingadmin] role_arn = arn:aws:iam::123456789012:role/marketingadmin color = ffaaee [anotheraccount] aws_account_id = 987654321987 role_name = anotherrole region=ap-northeast-1 ``` ### Complex Configuration More complex configurations involve multiple AWS accounts and/or organizations. - A profile that has only `aws_account_id` (without a `role_name`) is defined as **base account**. - If your account is aliased, you specify `aws_account_alias` in **base account**. - A **target role** is associated with a **base account** by the **target role** specifying a `source_profile`. - As above, **target roles** can be expressed with a `role_arn` or with both `aws_account_id` and `role_name` and can optionally pass the optional parameters. - If `target_role_name` is set in **base account**, the value is provided as the default role name for each **target roles**. ``` [organization1] aws_account_id = your-account-alias [Org1-Account1-Role1] role_arn = arn:aws:iam::123456789012:role/Role1 source_profile = organization1 [Org1-Account1-Role2] aws_account_id = 123456789012 role_name = Role2 source_profile = organization1 [Org1-Account2-Role1] aws_account_id = 210987654321 role_name = Role1 source_profile = organization1 [baseaccount2] aws_account_id = 000000000000 [Base2-Role1] role_arn = arn:aws:iam::234567890123:role/Role1 source_profile = baseaccount2 [AnotherRole] role_name = SomeOtherRole aws_account_id = account-3-alias ``` If you sign-in a base account, target roles of the other base accounts are excluded. For more information, please visit the homepage.

4.9 out of 583 ratings

Google doesn't verify reviews. Learn more about results and reviews.

Review's profile picture

Sneh GadaNov 28, 2022

This is just simple, so use-full and amazing

1 person found this review to be helpful
Review's profile picture

Bryan DadyJul 6, 2022

Top 5 most helpful browser extensions. Here is the format/syntax that works for me: [Account_Alias] aws_account_id = ############ role_name = admin region = us-east-2 ...

3 out of 3 found this helpful
Review's profile picture

Paul BenoitJun 16, 2022

The config saves and says it is valid, but the plugin shows zero accounts in the Chrome taskbar.

2 out of 2 found this helpful

Details

  • Version
    5.0.1
  • Updated
    April 7, 2024
  • Offered by
    Tilfin Ltd.
  • Size
    81.77KiB
  • Languages
    English
  • Developer
    Email
    toshi@tilfin.com
  • Non-trader
    This developer has not identified itself as a trader. For consumers in the European Union, please note that consumer rights do not apply to contracts between you and this developer.

Privacy

The developer has disclosed that it will not collect or use your data.

This developer declares that your data is

  • Not being sold to third parties, outside of the approved use cases
  • Not being used or transferred for purposes that are unrelated to the item's core functionality
  • Not being used or transferred to determine creditworthiness or for lending purposes

Support

Related

SAML to AWS STS Keys Conversion

3.9(10)

Generates file with AWS STS Keys after logging in to AWS webconsole using SSO (SAML 2.0). It leverages 'assumeRoleWithSAML' API.

Datadog test recorder

4.8(9)

Record end-to-end tests in your browser.

AWS Favicon Update

4.7(13)

IAM shouldn't be the only tab with a unique favicon! This sets favicons for many AWS services, so your tabs make more sense.

Former2 Helper

4.8(6)

Helps avoid CORS issues with former2.com

AWS Extend Switch Roles v1

0.0(0)

Extend your AWS IAM switching roles. You can set the configuration like aws config format

AWS Sidebar

4.0(4)

AWS Console Navigation Sidebar for Chrome

AWS Helper

5.0(4)

Extension to help with using AWS Console

JSON Formatter

4.6(1.8K)

Makes JSON easy to read. Open source.

Extension for AWS SSO

4.8(5)

This extension is for AWS Single Sign-On (AWS SSO).

AWS SSO Extender

5.0(5)

Organize access to the AWS console & other AWS SSO (Identity Center) applications

AWS Role Editor

5.0(10)

This extension allows you to modify your AWS Roles.

Okta Browser Plugin

4.3(804)

Work outside the perimeter

SAML to AWS STS Keys Conversion

3.9(10)

Generates file with AWS STS Keys after logging in to AWS webconsole using SSO (SAML 2.0). It leverages 'assumeRoleWithSAML' API.

Datadog test recorder

4.8(9)

Record end-to-end tests in your browser.

AWS Favicon Update

4.7(13)

IAM shouldn't be the only tab with a unique favicon! This sets favicons for many AWS services, so your tabs make more sense.

Former2 Helper

4.8(6)

Helps avoid CORS issues with former2.com

AWS Extend Switch Roles v1

0.0(0)

Extend your AWS IAM switching roles. You can set the configuration like aws config format

AWS Sidebar

4.0(4)

AWS Console Navigation Sidebar for Chrome

AWS Helper

5.0(4)

Extension to help with using AWS Console

JSON Formatter

4.6(1.8K)

Makes JSON easy to read. Open source.

Google apps