Onelogin-aws-assume-role

Latest version: v1.10.1

Safety actively analyzes 688758 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 4 of 4

1.2.0

Not secure
* [10](https://github.com/onelogin/onelogin-python-aws-assume-role/issues/10) Be able to provide ip_address parameter to bypass MFA
* [7](https://github.com/onelogin/onelogin-python-aws-assume-role/issues/7) Fix Credential writer.
* Improve error handler: Detect when OL API Key data is wrong on initialization and detect when get_saml_assertion returns 400 or 401 and try to get new input when possible.
* Update dependencies: OneLogin Python SDK and Boto3

1.1.0

changelog:
* Avoid the use of .text directly to get node value. Instead remove comments before.
* Add ability to specify AWS region via argument too
* Select MFA device automatically if there is only one
* Add ability to specify username, app ID and subdomain via command-line
* Fixed issue with string concatenation because of int

Page 4 of 4

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.