-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS SSO CLI fallback to device authorization grant doesn't work #9092
Comments
Thanks for the report! This is an issue in the flag's introduction in |
This should be addressed in
Let us know if you're still seeing any issues. |
The behavior changed from the original cli. aws sso login --profile xxx --no-browser
Attempting to automatically open the SSO authorization page in your default browser.
If the browser does not open or you wish to use a different device to authorize this request, open the following URL:
https://oidc.us-east-1.amazonaws.com/authorize?response_type=code&client_id=W aws sso login --profile xxx --use-device-code
Attempting to automatically open the SSO authorization page in your default browser.
If the browser does not open or you wish to use a different device to authorize this request, open the following URL:
https://device.sso.us-east-1.amazonaws.com/
Then enter the code:
XXXX-XXXX
|
@ntang-tmx the intended behavior is:
Is your first snippet from
|
Indeed, the snippet is from another version. You're right, I did not check the |
@ntang-tmx Thanks, so I believe that's working as expected then, but let us know if you're still hitting issues |
Describe the bug
Running this in a Vagrant box, PKCE-based Authorization for SSO doesn't work as it needs a browser.
Following recommendations in the official blog post and docs, I tried using the
--use-device-code
flag but it doesn't seem to make a difference:Workaround:
I had to follow this two-step process, as the
--use-device-code
flag seems to work for theaws sso login
command:And then configure an SSO profile:
Regression Issue
Expected Behavior
SSO authorization workflow via OAuth 2.0 device authorization grant to work in the
aws configure sso
command when--use-device-code
option is used.Current Behavior
See description
Reproduction Steps
See description
Possible Solution
No response
Additional Information/Context
No response
CLI version used
2.22.1
Environment details (OS name and version, etc.)
Linux/5.15.0-91-generic exe/x86_64.ubuntu.22 Python/3.12.6
The text was updated successfully, but these errors were encountered: