Docs/ Replace AWS Access Keys with Short-Lived Credentials
View as .md

Replace AWS Access Keys with Short-Lived Credentials

Configure AWS IAM to trust Vouch as an OIDC identity provider

Vouch eliminates static AWS access keys. You configure AWS to trust Vouch as an OIDC identity provider, and developers get temporary STS credentials – valid for up to 1 hour – after authenticating with their YubiKey. Every API call is tied to a verified human identity in CloudTrail.

How Vouch compares to aws login and aws sso login

AWS provides two built-in CLI authentication commands. Here is how they compare to Vouch:

  • aws login – New in AWS CLI v2.32+. Opens a browser to authenticate with your AWS Console credentials (IAM user, root, or federated identity) and issues temporary credentials for up to 12 hours. It requires the SignInLocalDevelopmentAccess managed policy and only covers AWS – it does not provide credentials for SSH, GitHub, Docker registries, or other services.

  • aws sso login – Authenticates through AWS IAM Identity Center (formerly AWS SSO). It requires an Identity Center instance and an SSO-configured profile (aws configure sso). Like aws login, it only covers AWS services.

  • vouch login – Authenticates with a FIDO2 hardware key (YubiKey) and provides credentials for AWS, SSH, GitHub, Docker registries, Cargo registries, AWS CodeCommit, AWS CodeArtifact, databases, and any OIDC-compatible application – all from a single session. Every credential is tied to a hardware-verified human identity, and authentication is phishing-resistant by design.

aws loginaws sso loginvouch login
AuthenticationBrowser + console credentialsBrowser + Identity CenterYubiKey tap (FIDO2)
Phishing-resistantDepends on IdPDepends on IdPYes (hardware-bound)
AWS credentialsYes (up to 12h)YesYes (up to 1h)
SSH, GitHub, Docker, etc.NoNoYes
Identity in CloudTrailIAM user or roleSSO userHardware-verified user
Requires AWS-managed serviceNoIAM Identity CenterNo

If you already use IAM Identity Center, aws sso login may cover your AWS needs. Vouch is a better fit when you want a single authentication event to cover AWS and everything else your team uses, with the guarantee that every credential traces back to a physical hardware key.

How it works

  1. The developer runs vouch login and authenticates with their YubiKey.
  2. The Vouch server issues a short-lived OIDC ID token signed with ES256 (ECDSA over P-256). The token contains claims such as sub (user ID) and email.
  3. When the developer runs an AWS command (or vouch credential aws), the CLI calls AWS STS AssumeRoleWithWebIdentity, presenting the ID token.
  4. AWS validates the token signature against the Vouch server’s JWKS endpoint, checks the audience and issuer, and returns temporary credentials (access key, secret key, session token) valid for up to 1 hour.
  5. The developer’s AWS CLI, SDK, or Terraform session uses these credentials transparently.

Because the ID token is scoped to the authenticated user and is short-lived, credentials cannot be shared or reused after expiry.


Step 1 – Create the OIDC Provider in AWS (admin)

Before any user can assume a role, an administrator must register the Vouch server as an OIDC identity provider in the target AWS account.

AWS CLI

For background on OIDC identity providers in AWS, see Creating OpenID Connect (OIDC) identity providers in the AWS documentation.

aws iam create-open-id-connect-provider \
  --url "https://us.vouch.sh" \
  --client-id-list "https://us.vouch.sh"

Note: AWS fetches the JWKS from https://us.vouch.sh/.well-known/jwks.json at runtime to verify token signatures. A ThumbprintList is no longer required – AWS obtains the root CA thumbprint automatically.

CloudFormation

AWSTemplateFormatVersion: "2010-09-09"
Description: Vouch OIDC Identity Provider

Resources:
  VouchOIDCProvider:
    Type: "AWS::IAM::OIDCProvider"
    Properties:
      Url: "https://us.vouch.sh"
      ClientIdList:
        - "https://us.vouch.sh"

Terraform

resource "aws_iam_openid_connect_provider" "vouch" {
  url            = "https://us.vouch.sh"
  client_id_list = ["https://us.vouch.sh"]
}

Step 2 – Create an IAM Role (admin)

Create an IAM role that developers will assume. The trust policy must allow AssumeRoleWithWebIdentity from the Vouch OIDC provider.

AWS CLI

ACCOUNT_ID=$(aws sts get-caller-identity --query Account --output text)

cat > /tmp/vouch-trust-policy.json << EOF
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Principal": {
        "Federated": "arn:aws:iam::${ACCOUNT_ID}:oidc-provider/us.vouch.sh"
      },
      "Action": [
        "sts:AssumeRoleWithWebIdentity",
        "sts:SetSourceIdentity",
        "sts:TagSession"
      ],
      "Condition": {
        "StringEquals": {
          "us.vouch.sh:aud": "us.vouch.sh"
        },
        "StringLike": {
          "us.vouch.sh:sub": "*@example.com"
        }
      }
    }
  ]
}
EOF

aws iam create-role \
  --role-name VouchDeveloper \
  --assume-role-policy-document file:///tmp/vouch-trust-policy.json

# Attach a permissions policy (example: read-only access)
aws iam attach-role-policy \
  --role-name VouchDeveloper \
  --policy-arn arn:aws:iam::aws:policy/ReadOnlyAccess

CloudFormation

Resources:
  VouchDeveloperRole:
    Type: AWS::IAM::Role
    Properties:
      RoleName: VouchDeveloper
      AssumeRolePolicyDocument:
        Version: "2012-10-17"
        Statement:
          - Effect: Allow
            Principal:
              Federated: !Sub "arn:${AWS::Partition}:iam::${AWS::AccountId}:oidc-provider/us.vouch.sh"
            Action:
              - "sts:AssumeRoleWithWebIdentity"
              - "sts:SetSourceIdentity"
              - "sts:TagSession"
            Condition:
              StringEquals:
                "us.vouch.sh:aud": "us.vouch.sh"
              StringLike:
                "us.vouch.sh:sub": "*@example.com"
      ManagedPolicyArns:
        - !Sub "arn:${AWS::Partition}:iam::aws:policy/ReadOnlyAccess"

Terraform

data "aws_caller_identity" "current" {}
data "aws_partition" "current" {}
data "aws_iam_policy" "readonly" {
  name = "ReadOnlyAccess"
}

locals {
  aws_partition  = data.aws_partition.current.partition
  aws_account_id = data.aws_caller_identity.current.account_id
}

resource "aws_iam_role" "vouch_developer" {
  name = "VouchDeveloper"

  assume_role_policy = jsonencode({
    Version = "2012-10-17"
    Statement = [
      {
        Effect = "Allow"
        Principal = {
          Federated = "arn:${local.aws_partition}:iam::${local.aws_account_id}:oidc-provider/us.vouch.sh"
        }
        Action = [
          "sts:AssumeRoleWithWebIdentity",
          "sts:SetSourceIdentity",
          "sts:TagSession",
        ]
        Condition = {
          StringEquals = {
            "us.vouch.sh:aud" = "us.vouch.sh"
          }
          StringLike = {
            "us.vouch.sh:sub" = "*@example.com"
          }
        }
      }
    ]
  })
}

resource "aws_iam_role_policy_attachment" "vouch_developer_readonly" {
  role       = aws_iam_role.vouch_developer.name
  policy_arn = data.aws_iam_policy.readonly.arn
}

Tips for restricting access

Restrict by email address

Limit role assumption to specific users by adding an email condition to the trust policy:

"Condition": {
  "StringEquals": {
    "us.vouch.sh:aud": "us.vouch.sh",
    "us.vouch.sh:sub": ["user@example.com"]
  }
}

Restrict by email domain

Allow any user from a specific domain:

"Condition": {
  "StringEquals": {
    "us.vouch.sh:aud": "us.vouch.sh"
  },
  "StringLike": {
    "us.vouch.sh:sub": "*@example.com"
  }
}

Session tags

Vouch sets the following session tags when assuming a role, which you can use in IAM policies for attribute-based access control (ABAC):

Tag KeyValueExample
emailThe user’s verified emailalice@example.com
domainThe user’s organization domain (from the OIDC hd claim)example.com

You can reference these tags in IAM policy conditions using aws:PrincipalTag:

{
  "Condition": {
    "StringEquals": {
      "aws:PrincipalTag/domain": "example.com"
    }
  }
}

Because Vouch marks both tags as transitive, they automatically propagate through role chains. If a developer assumes a hub role via Vouch and then chains into a spoke role in another account, the spoke role’s trust policy can still evaluate aws:PrincipalTag/email and aws:PrincipalTag/domain conditions.


Step 3 – Configure the Vouch CLI

Each developer needs to tell the CLI which IAM role to assume and in which AWS profile to store the credentials. Run:

vouch setup aws --role arn:aws:iam::123456789012:role/VouchDeveloper

This command accepts the following flags:

  • --role – The ARN of the IAM role created in Step 2 (required).
  • --profile – The AWS profile name to write credentials to (default: vouch; additional profiles auto-name as vouch-2, vouch-3, etc.).

The command writes a credential_process entry into ~/.aws/config so that the AWS CLI and SDKs automatically call vouch credential aws whenever credentials are needed:

[profile vouch]
credential_process = vouch credential aws --role arn:aws:iam::123456789012:role/VouchDeveloper

Note: If you need a specific region for this profile, add a region line manually (e.g., region = us-east-1).

If your organization uses AWS IAM Identity Center, you can auto-discover all available accounts and roles with vouch setup aws --discover. See SSO-based authentication below and Multi-Account AWS Strategy for details.


Step 4 – Test

Verify that everything is working:

# Make sure you are logged in
vouch login

# Check your identity
aws sts get-caller-identity --profile vouch

You should see output similar to:

{
  "UserId": "AROA...:alice@example.com",
  "Account": "123456789012",
  "Arn": "arn:aws:sts::123456789012:assumed-role/VouchDeveloper/alice@example.com"
}

Try running a command against a real AWS service:

aws s3 ls --profile vouch

SSO-based authentication

If your organization uses AWS IAM Identity Center, the Vouch CLI can authenticate through your existing SSO session and automatically discover available accounts and roles:

# Authenticate via IAM Identity Center SSO
vouch aws login

# List available accounts
vouch aws accounts

# List roles in a specific account
vouch aws roles --account 123456789012

See Multi-Account AWS Strategy for details on role chaining and auto-discovery across multiple accounts.


Console access

Open the AWS Management Console directly from the CLI without entering credentials in a browser:

vouch aws console

This uses your active Vouch session to obtain temporary STS credentials, exchanges them for a federation sign-in token, and opens the console in your default browser. Pass --role to specify a role, or omit it to use the role from your configured AWS profile.


Troubleshooting

“Not authorized to perform sts:AssumeRoleWithWebIdentity”

  • Verify the OIDC provider URL in the IAM trust policy matches https://us.vouch.sh exactly (no trailing slash).
  • Confirm the aud condition matches the client ID registered with the OIDC provider.
  • Ensure the trust policy Action includes all three required actions: sts:AssumeRoleWithWebIdentity, sts:SetSourceIdentity, and sts:TagSession.

“Token is expired”

  • Run vouch login again to refresh your session. OIDC tokens are short-lived by design.

“Invalid identity token”

  • Ensure the OIDC provider in AWS points to the correct Vouch server URL: https://us.vouch.sh.
  • Verify that the Vouch server’s JWKS endpoint (https://us.vouch.sh/.well-known/jwks.json) is reachable from the internet (AWS must be able to fetch it).

Credentials not appearing in the expected profile

  • Run vouch setup aws again and verify the profile name.
  • Check ~/.aws/config for conflicting profile definitions.

Permission errors after assuming the role

  • The trust policy controls who can assume the role; the permissions policy controls what they can do. Verify the correct permissions policies are attached to the IAM role.