Skip to content

Instantly share code, notes, and snippets.

@OnlyInAmerica
Created April 3, 2014 22:52
Show Gist options
  • Star 35 You must be signed in to star a gist
  • Fork 24 You must be signed in to fork a gist
  • Save OnlyInAmerica/9964456 to your computer and use it in GitHub Desktop.
Save OnlyInAmerica/9964456 to your computer and use it in GitHub Desktop.
Find an AWS IAM user corresponding to an AWS Access Key
# Find the IAM username belonging to the TARGET_ACCESS_KEY
# Useful for finding IAM user corresponding to a compromised AWS credential
# Requirements:
#
# Environmental variables:
# AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
# python:
# boto
import boto.iam
TARGET_ACCESS_KEY = 'TARGET_KEY'
iam = boto.connect_iam()
users = iam.get_all_users('/')['list_users_response']['list_users_result']['users']
def find_key():
for user in users:
for key_result in iam.get_all_access_keys(user['user_name'])['list_access_keys_response']['list_access_keys_result']['access_key_metadata']:
aws_access_key = key_result['access_key_id']
if aws_access_key == TARGET_ACCESS_KEY:
print 'Target key belongs to:'
print 'user : ' + user['user_name']
return True
return False
if not find_key():
print 'Did not find access key (' + TARGET_ACCESS_KEY + ') in ' + str(len(users)) + ' IAM users.'
@pc-star
Copy link

pc-star commented Sep 30, 2019

For AWS CLI; you can use this one-liner: aws iam get-access-key-last-used --access-key-id $AWS_ACCESS_KEY_ID

Thanks @AnthonyWC for that. it was all I needed 👍

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment