Use Cases

3 Main Use Cases for keyup:


List Access Keys

Display access keys for a specific IAM user in an AWS Account.

$ keyup --profile [PROFILE] --operation list

[PROFILE]:

  • awscli profile name profile from the local awscli config
  • IAM user for whom you wish to conduct key operations

list:

  • list operation, lists key information for the profile username given in PROFILE.
  • Prints report showing access key id, key age (time since creation), and status (active or inactive)
'list'

Rotate Keys (User-Initiated)

Attended mode, manual operation run from cli. Operator can enter MFA code if required

$ keyup --profile [PROFILE] --operation up

[PROFILE]:

  • awscli profile name profile from the local awscli config
  • IAM user for whom you wish to conduct key operations

up:

  • update (rotate, or renew) key operation.
  • Creates new access keyset (access key, secret key), installs keys, delete old keys from AWS
  • Short for keyup, which can also be used

Rotate Keys output (click below to enlarge imges)

  1. Initiate access key rotation (‘up’). Displays access keys for user prior to key renewal:
'rotate1b'
  1. Progress during key renewal:
'rotate2'
  1. Display access keys after key rotation showing new keyset generated:
'rotate3'
  1. End-to-end cli view of the user-initiated key rotation process:
'rotate4'

Rotate Keys (Automated)

Automated rotation of access keys; typically executed via cron or similar scheduling mechanism

$ keyup --profile [PROFILE] --operation up --auto

[PROFILE]:

  • profile from the local awscli config that is the IAM user for whom you wish to keyup

up:

  • up: create new access keys, install them, delete old keys from AWS

--auto:

  • For use when calling keyup from an automated scheduler or other programmatic execution mechanism.
  • Flag suppresses all stdout output
  • Log output to the filesystem is retained.

Back to Use Cases Top


Table Of Contents