-
Notifications
You must be signed in to change notification settings - Fork 74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
getting Token has expired and refresh failed after successful login #83
Comments
it works even after SSO session has expired if I remove this line from
|
|
this is what I've got for expired session (I decided to run second item first)
then I run
which eventually fixed the expired session issue |
while following a sso login journey in a browser I saw that |
A change to the CLI/boto3 to support refresh tokens seems to be the cause, but I'm not going to be able to figure out the fix for a couple days at least. |
I think I can summarize this issue to - for some reason |
As long as you signed in to IAM Identity Center and those cached credentials are not expired, the AWS CLI automatically renews expired AWS credentials when needed. However, if your IAM Identity Center credentials expire, you must explicitly renew them by logging in to your IAM Identity Center account again. by using following method: $ aws sso login --profile urprofilename you can verify same by using following command: |
Yup, that's what I have preventively been doing, but leveraging the tool itself, so that it picks a correct SSO profile automatically
|
i have installed aws-sso-util utility and configured my profile aws-sso-util configure profile, after configuration when i used aws-sso-util login,it attempted to login IAM Identity Center, once login succeed, it saying Login succeeded, valid until 2024-02-13 19:36 India Standard Time, does it again temporary access , cant make it as permanent ? |
wht i felt aws-sso-util configure profile and aws configure sso , both does same job , also aws sso login --profile and aws-sso-util login ,again does same job, no difference. |
I have somewhat of a similar issue, and it is described here: aws/aws-cli#7656 (comment) For those interested, there seems to be a possible solution of increasing the default IAM session time. |
hello,
could you please suggest what I'm doing wrong here? my setup only works while the first SSO session is active, after that I'm getting the following, for example:
my
aaaa
profile was initially configured in this way:if I'd remove
~/.aws/
folder and try again to reconfigure the profile it works, but again while the SSO session is activesample
~/.aws/config
filemy
~/.profile
has these environment variablesThe text was updated successfully, but these errors were encountered: