Skip to content

Commit 0dd81bd

Browse files
committed
Add links to STS profiles.
1 parent eef9dca commit 0dd81bd

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

protocols/s3/index.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -255,7 +255,7 @@ profile for both steps.
255255

256256
- [Configuring the AWS CLI to use AWS Single Sign-On](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html)
257257

258-
#### Connecting Using AssumeRole from AWS Security Token Service (STS)
258+
### Connecting Using AssumeRole from AWS Security Token Service (STS)
259259

260260
:::{admonition} Tutorial
261261
:class: tip
@@ -275,7 +275,9 @@ to [Using IAM Roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_u
275275

276276
![MFA Token Prompt](_images/MFA_Token_Prompt.png)
277277

278-
You must provide configuration in the standard credentials property file `~/.aws/credentials` on macOS or
278+
- {download}`Download<https://profiles.cyberduck.io/AWS%20S3%20(STS%20Assume%20Role).cyberduckprofile>` the *AWS S3 (STS AssumeRole)* profile for preconfigured settings
279+
- {download}`Download<https://profiles.cyberduck.io/AWS%20S3%20(MFA%20Session%20Token).cyberduckprofile>` the *AWS S3 (MFA Session Token)* profile for preconfigured settings
280+
- {download}`Download<https://profiles.cyberduck.io/S3%20(Credentials%20from%20AWS%20Command%20Line%20Interface).cyberduckprofile>` the *S3 (Credentials from AWS Command Line Interface) profile* to connect with settings from AWS CLI. You must provide configuration in the standard credentials property file `~/.aws/credentials` on macOS or
279281
`%USERPROFILE%\.aws\credentials` on Windows
280282
from [AWS Command Line Interface](https://docs.aws.amazon.com/cli/latest/userguide/cli-multiple-profiles.html).
281283
Configure a bookmark with the field titled *Profile Name in `~/.aws/credentials`* matching the profile name from
@@ -298,7 +300,7 @@ mfa_serial=arn:aws:iam::123456789012:mfa/testuser
298300
### Read Credentials from `~/.aws/credentials`
299301

300302
When editing a bookmark, the *Access Key ID* is set from the `default` profile in the credentials file located at
301-
`~/.aws/credentials` on macOS or `%USERPROFILE%\.aws\credentials` on Windows if such a profile exists.
303+
`~/.aws/credentials` on macOS or `%USERPROFILE%\.aws\credentials` on Windows if such a profile exists or the profile name matching the .
302304

303305
### Connecting Without Using AWS credentials
304306

0 commit comments

Comments
 (0)