Difference between revisions of "AWS SESSION TOKEN"
Jump to navigation
Jump to search
Line 12: | Line 12: | ||
* <code>[[AWS_ACCESS_KEY_ID]]</code> | * <code>[[AWS_ACCESS_KEY_ID]]</code> | ||
[[AWS_REGION]] | [[AWS_REGION]] | ||
+ | [[AWS_PROFILE]] | ||
== See also == | == See also == |
Revision as of 22:37, 30 August 2022
AWS_SESSION_TOKEN
An error occurred (ExpiredToken) when calling the ListVirtualMFADevices operation: The security token included in the request is expired
~/.aws/credentials aws_session_token=XXXX
Related
aws sts get-session-token --serial-number <mfa_device> --token-code <token>
aws-sts-get-session-token
scriptunset
AWS_ACCESS_KEY_ID
AWS_REGION AWS_PROFILE
See also
- AWS CLI: environmental variables,
aws configure, ~/.aws/config
,~/.aws/credentials
,~/.aws/cli/alias, AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
aws configure [ list-profiles | sso | sso-session | set ]
,~/.aws/config
,.aws/credentials
,mfa_serial
, AWS cli environmental variables:AWS_PROFILE
,AWS_REGION, AWS_DEFAULT_REGION, AWS_SESSION_TOKEN, AWS_ROLE_SESSION_NAME
,.aws/
, AWS functions,--profile, viawsconfig, viawscredentials
- AWS STS
(sts:)
,aws sts
[get-session-token
|get-caller-identity
|assume-role | assume-role-with-web-identity | assume-role-with-saml | get-access-key-info ]
Advertising: