AWS Settings¶
Configure AWS credentials and Single Sign-On for AWS Session Manager tunnels.
Quick Setup¶
- Install AWS CLI - StormTunnel uses your existing AWS configuration
- Configure credentials - Run
aws configurein Terminal - Select profile - Choose your AWS profile in Settings
- Set region - Pick your default AWS region
- Ready - Create AWS Session Manager tunnels
Credentials¶
AWS Profile¶
Select which AWS profile to use from the dropdown. Profiles are loaded from ~/.aws/config and ~/.aws/credentials.
Supported profile types:
- Standard credentials (Access Key + Secret Key)
- Temporary credentials (with Session Token)
- SSO profiles (Amazon SSO login)
- Assume Role profiles (cross-account access)
Profile not listed?
Run aws configure in Terminal, then restart StormTunnel to refresh.
Credentials Status¶
| Status | Meaning |
|---|---|
| ✅ Connected | Credentials valid and ready |
| ⏳ Checking | Validating credentials |
| ❌ Invalid | Missing, expired, or incorrect |
Region¶
Select your default AWS region for Session Manager tunnels. You can override this per-tunnel.
Instance not found?
Verify the instance is in the selected region and has SSM Agent running.
AWS Single Sign-On (SSO)¶
Use browser-based SSO authentication instead of storing access keys.
Setup¶
- Enable AWS SSO toggle
- Enter your SSO Start URL (e.g.,
https://your-org.awsapps.com/start) - Select your SSO Region (usually
us-east-1) - Click Authenticate with SSO
- Sign in through browser
SSO Status¶
| Status | Action |
|---|---|
| ✅ Authenticated | Token valid, ready to use |
| ⏳ Token Expiring Soon | Will refresh automatically |
| ❌ Token Expired | Click "Re-authenticate" |
Required Permissions¶
Your AWS user/role needs these permissions:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ssm:StartSession",
"ssm:TerminateSession",
"ec2:DescribeInstances"
],
"Resource": "*"
}
]
}
Click Check Permissions to validate your access.
Cross-Account Access¶
To access resources in other AWS accounts, create an assume role profile:
[profile cross-account]
role_arn = arn:aws:iam::987654321098:role/CrossAccountRole
source_profile = default
Select this profile in AWS Settings.
Troubleshooting¶
"Profile Not Found"¶
- Run
aws configurein Terminal - Verify
~/.aws/configexists - Restart StormTunnel
"Invalid Credentials"¶
- Check if access key expired
- Verify IAM user is active
- Contact AWS admin for new credentials
"Permission Denied"¶
- Verify IAM policy includes
ssm:StartSession - Check EC2 instance has SSM Agent running
- Verify instance IAM role includes
AmazonSSMManagedInstanceCore
"Instance Not Found"¶
- Check selected region matches instance location
- Verify SSM Agent is running on instance
- Check instance has proper IAM role
Security¶
- Credentials stored: In standard AWS locations (
~/.aws/) - SSO tokens: Stored in macOS Keychain (encrypted)
- Never logged: Credentials are never written to logs
- Never transmitted: Only sent to AWS APIs
Related¶
- AWS Session Manager - Create AWS tunnels
- AWS IAM Policies - Full policy examples
- Troubleshooting - Fix AWS connection issues
- License Settings - AWS SSO requires Premium
