- Option to set custom Session Duration
- Fix #61. Instead of using the aws http api directly for AssumeRoleWithSAML, this version switches to using the aws sdk. This is to fix processing large SAML Assertions.
- Fix #62. When the IDP does not add a Session Duration as SAML Assertion Attribute, ignore and continue.
- Fix #58. Parse various SAML Assertion AttributeValue syntax in a consistent way.
- Code refactoring due to upgrading to Extension Manifest V3
- Improved popup styling
- LCM on dependency libs
- At request of Google, the "tabs" permission is removed.
- Changed permissions. The extension will now ask access to any requested URL. This is needed because of changed policy in Chrome 72 for the chrome.webRequest API. Read here for the rationale behind it. Fixes #28.
- Adds the option to enable debug logs
- Implements CRLF as newlines in the credentials file when the client is on Windows. Fixes #21
- Removes unnecessary spaces prior the newlines in credentials file. Fixes #14
- Bug fix for users with one IAM role in the SAML claim. Bug was introduced with release 2.1, but according to user reports only results in an error starting with Chrome release 68.
- Release 2.2 revealed many users have their SAML provider requesting a SessionDuration which is higher than the maximum session duration configured at the IAM Role. Release 2.3 now supports manually enabling or disabling this SessionDuration feature. The feature is enabled by default, but can be disabled in the options.
- Now supports the SessionDuration SAML attribute which can be set by your IDP administrator. This can keep your credentials valid longer than the default 1 hour. Thanks to Jeroen for his contribution!
- Bug fix: Chrome 62 broke the extension. Special thanks for Brice for contributing. Thanks to Gijs for helping out with testing.
- Added functionality to specify Role ARN's in the options panel. This is meant for cross-account assume-role API calls. For each specified role temporary credentials will be fetched and added to the credentials file.
- Updated 'AWS SDK for Javascript' library to latest version
- Plugin now shows changelog to the user after the installation of new version
- Options panel has a new look to improve readability
- Bug fix: when just 1 role in the SAML Assertion available now also works well
- Now uses a regex to extract Role and Principal from SAML Assertion. This way it does not matter in what order the IDP adds the Role and Principle to the SAML Assertion.
- Improved usability. No longer needed to manually specify PrincipalArn and RoleArn in options panel. Removed these options from the options panel. PrincipalArn and RoleArn is now parsed from the SAML Assertion itself.
- Initial release