Allow Login to AWS Athena with Profile from Credentials File
# temporary credentials to access the AWS account for # user role arn:aws:iam::123456789012:role/user-role-<userid> # from here: # https://myappcallingcognito.mydomain.com/ssocredentials [my_temp_aws_account_credentials] aws_access_key_id = ... aws_secret_access_key = ... aws_session_token = ... [athena_access_project_x] # user role arn:aws:iam::123456789012:role/user-role-<userid> # needs to be set up to be able to assum efollowing role: role_arn = arn:aws:iam::123456789012:role/project-x-read source_profile = my_temp_aws_account_credential region = eu-central-1
athena_access_project_x
in this example) and is connected until the credentials expire. This also allows the organisation in question to manage their users in just one directory rather than also having to manage them in AWS IAM.
An option to connect to AWS Athena from WinSCP by entering the profile name from the credentials file would be greatly appreciated.