Connecting using AssumeRole from AWS Security Token Service (STS)

Instead of providing Access Key ID and Secret Access Key, authenticate using temporary credentials from AWS Security Token Service (STS) with optional Multi-Factor Authentication (MFA), making Cyberduck and Mountain Duck more friendly to enterprise deployments. You will need to install the custom connection profile S3 (Credentials from AWS Security Token Service) available from our website.

Our implementation to obtain temporary credentials is interoperable with standard AWS CLI configuration in ~/.aws/credentials. Refer to our wiki for documentation.