OIDC credential helper for AWS CLI using PKCE. Zero external dependencies beyond Python 3.
Authenticates via browser login to your OIDC provider, exchanges the ID token for temporary AWS credentials via STS AssumeRoleWithWebIdentity, and outputs them in credential_process format.
brew tap eitumd/tap
brew install aws-oidcAdd a profile to ~/.aws/config:
[profile myprofile]
credential_process = aws-oidc arn:aws:iam::123456789012:role/MyRole
region = us-east-1Then use it normally:
aws --profile myprofile sts get-caller-identity- Checks for a cached/refreshable token in
~/.aws/oidc-cache/ - If needed, opens a browser for OIDC login (PKCE, no client secret)
- Exchanges the ID token for temporary AWS credentials via STS
- Outputs JSON in the format expected by
credential_process
Tag and push:
git tag v0.1.0
git push origin v0.1.0CI creates a GitHub Release and updates the Homebrew formula automatically.