AWS Extend Switch Roles插件简介
🌹 这个应用程序可以在 ChromeFK 或 Google Chrome 网上应用商店进行下载。 ChromeFK上的所有插件扩展文件都是原始文件,并且 100% 安全,下载速度快。
AWS Extend Switch Roles插件描述
Switch roll histy does not remain only 5 maximum on the AWS Management Console. This extension extends to show me switch roles by loading your aws configuration. The bottom of the console header is emphasized with your specified col if you assume a cross account role. Suppts Chrome Sync ## Configuration Suppts ~/.aws/config fmat like ~/.aws/credentials ### Simple Configuration The simplest configuration is f multiple **target roles** when you always intend to show the whole list. **Target roles** can be expressed with a `role_arn` with both `aws_account_id` `role_name`. #### Optional parameters * `col` The RGB hex value (without the prefix #) f the col of the header bottom bder around the current profile. * `region` Changing the region whenever switching the role if this parameter is specified. * `image` The uri of an image to use on top of any col attribute supplied. The col image are not mutually exclusive. ``` [profile marketingadmin] role_arn = arn:aws:iam::123456789012:role/marketingadmin col = ffaaee [anotheraccount] aws_account_id = 987654321987 role_name = anotherrole region=apntheast1 [athirdaccount] aws_account_id = 987654321988 role_name = athirdrole image = "https://via.placeholder.com/150" ``` ### Complex Configuration Me complex configurations involve multiple AWS accounts / ganizations. A profile that has only `aws_account_id` (without a `role_name`) is defined as **base account**. **If your account is aliased, the alias will be shown in the role dropdown after Account:. You MUST use that alias as the aws_account_id f the base account instead of the numerical account id your configuration wont wk as expected.** A **target role** is associated with a **base account** by the **target role** specifying a `source_profile`. As above, **target roles** can be expressed with a `role_arn` with both `aws_account_id` `role_name` can optionally pass the optional parameters. If `target_role_name` is set in **base account**, the value is provided as the default role name f each **target roles**. ``` [ganization1] aws_account_id = youraccountalias [Org1Account1Role1] role_arn = arn:aws:iam::123456789012:role/Role1 source_profile = ganization1 [Org1Account1Role2] aws_account_id = 123456789012 role_name = Role2 source_profile = ganization1 [Org1Account2Role1] aws_account_id = 210987654321 role_name = Role1 source_profile = ganization1 [baseaccount2] aws_account_id = 000000000000 [Base2Role1] role_arn = arn:aws:iam::234567890123:role/Role1 source_profile = baseaccount2 [AnotherRole] role_name = SomeOtherRole aws_account_id = account3alias ; ; target_role_name example ; [Org2BaseAccount] aws_account_id = 222200000000 target_role_name = Developer [Org2Account1Developer] aws_account_id = 222200001111 source_profile = Org2BaseAccount [Org2Account2Manager] aws_account_id = 222200002222 role_name = Manager ; overrides target role name source_profile = Org2BaseAccount ``` If you signin a base account, target roles of the other base accounts are excluded. The Show only matching roles setting is f use with me sophisticated account structures where youre using AWS Organizations with multiple accounts along with AWS Federated Logins via something like Active Directy Google GSuite. Common practice is to have a role in the master account that is allowed to assume a role of the same name in other member accounts. Checking this box means that if youre logged in to the Developer role in the master account, only member accounts with a role_arn ending in role/Developer will be shown. You wont see roles that your current role cant actually assume. ## Settings **Hide iginal role histy** hides iginal role histy (Show only roles in the configuration). **Hide account id** hides the account_id f each profile. **Show only matching roles** filters to only show profiles with roles that match your role in your master account. **Automatically assume last assumed role (Experimental)** automatically assumes last assumed role on the next signin if did not back to the base account signed out.
AWS Extend Switch Roles插件离线安装方法
1.首先用户点击谷歌浏览器右上角的自定义及控制按钮,在下拉框中选择设置。
2.在打开的谷歌浏览器的扩展管理器最左侧选择扩展程序或直接输入:chrome://extensions/
3.找到自己已经下载好的Chrome离线安装文件xxx.crx,然后将其从资源管理器中拖动到Chrome的扩展管理界面中,这时候用户会发现在扩展管理器的中央部分中会多出一个”拖动以安装“的插件按钮。
4.下载 AWS Extend Switch RolesChrome插件v2.3.2版本到本地。
5.勾选开发者模式,点击加载已解压的扩展程序,将文件夹选择即可安装插件。
注意:最新版本的chrome浏览器直接拖放安装时会出现“程序包无效CRX-HEADER-INVALID”的报错信息,参照这篇文章即可解决
©软件著作权归作者所有;本站所有软件均来源于网络,仅供学习使用,请支持正版!
转载请注明出处:chromefk非官方中文站 » AWS Extend Switch Roles