Skip to content

AWS Integration and Authentication

Grove can handle AWS authentication for you, making it easy to work with AWS services from your development environment without manually managing credentials.

Before using Grove’s AWS integration, you’ll need AWS SSO configured:

  1. Configure AWS CLI: Make sure you have AWS CLI v2 installed and configured.
  2. Set up SSO: Configure your AWS SSO settings in ~/.aws/config (AWS SSO configuration guide).
  3. Test authentication: Verify you can authenticate with aws sso login.

Your ~/.aws/config should look something like:

[default]
sso_start_url = https://your-org.awsapps.com/start
sso_region = us-east-1
sso_account_id = 123456789012
sso_role_name = DeveloperAccess
region = us-east-1

To enter your Grove environment with AWS authentication:

Terminal window
kanuka grove enter --auth

This will:

  • Start your Grove development environment.
  • Authenticate you with AWS SSO if needed.
  • Set up AWS credentials for your session.
  • Show authentication status and expiration time.

When your AWS credentials expire, you can re-authenticate:

Terminal window
# Re-enter with fresh authentication
kanuka grove enter --auth
# Or authenticate without entering the environment
aws sso login

Once authenticated, you can use AWS services normally:

Terminal window
# Inside your Grove environment with --auth
aws s3 ls
aws ec2 describe-instances
aws lambda list-functions

Grove’s AWS authentication is session-only, meaning:

  • You’ll always be prompted to authenticate when using --auth.
  • Authentication only lasts for the current shell session.
  • Environment variables are cleared when entering the Grove shell.
  • No persistent credentials are stored.

Common issues and solutions:

“SSO session not found”: Run aws sso login first.

“Credentials expired”: Re-run kanuka grove enter --auth or aws sso login.

“Profile not found”: Check your ~/.aws/config file configuration.

“Permission denied”: Verify your SSO role has the necessary permissions.

Grove’s AWS integration:

  • Never stores long-term credentials.
  • Uses temporary tokens that expire automatically.
  • Respects your existing AWS CLI configuration.
  • Works with your organization’s SSO policies.

To learn more about Grove’s AWS integration, see the development environments concepts and the command reference.

Or, continue reading to learn about other Kānuka features.