Notices: This section not yet converted to new layout. Download stats are rolling back out.

AWS IAM Authenticator for Kubernetes


Package test results are passing.

Private CDN cached downloads available for licensed customers. Never experience 404 breakages again! Learn more...

This package was approved by moderator gep13 on 5/8/2019.

AWS IAM Authenticator for Kubernetes

A tool to use AWS IAM credentials to authenticate to a Kubernetes cluster.
The initial work on this tool was driven by Heptio. The project receives contributions from multiple community engineers and is currently maintained by Heptio and Amazon EKS OSS Engineers.

Why do I want this?

If you are an administrator running a Kubernetes cluster on AWS, you already need to manage AWS IAM credentials to provision and update the cluster.
By using AWS IAM Authenticator for Kubernetes, you avoid having to manage a separate credential for Kubernetes access.
AWS IAM also provides a number of nice properties such as an out of band audit trail (via CloudTrail) and 2FA/MFA enforcement.

If you are building a Kubernetes installer on AWS, AWS IAM Authenticator for Kubernetes can simplify your bootstrap process.
You won't need to somehow smuggle your initial admin credential securely out of your newly installed cluster.
Instead, you can create a dedicated KubernetesAdmin role at cluster provisioning time and set up Authenticator to allow cluster administrator logins.

Please Note: This is an automatically updated package. If you find it is
out of date by more than a day or two, please contact the maintainer(s) and
let them know the package is no longer updating correctly.

To install AWS IAM Authenticator for Kubernetes, run the following command from the command line or from PowerShell:

C:\> choco install aws-iam-authenticator

To upgrade AWS IAM Authenticator for Kubernetes, run the following command from the command line or from PowerShell:

C:\> choco upgrade aws-iam-authenticator


  • tools\chocolateyinstall.ps1 Show
    $ErrorActionPreference = 'Stop';
    $toolsDir   = "$(Split-Path -parent $MyInvocation.MyCommand.Definition)"
    $packageArgs = @{
      packageName   = $env:ChocolateyPackageName
      fileFullPath  = "$toolsDir\aws-iam-authenticator.exe"
      url64bit      = ''
      checksum64    = 'd26ccd0e83667f79dea88a72072371fd87c2023895417b54c2bd0e4c55d7d5fa'
      checksumType64= 'sha256'
    Get-ChocolateyWebFile @packageArgs

Virus Scan Results

In cases where actual malware is found, the packages are subject to removal. Software sometimes has false positives. Moderators do not necessarily validate the safety of the underlying software, only that a package retrieves software from the official distribution point and/or validate embedded software against official distribution point (where distribution rights allow redistribution).

Chocolatey Pro provides runtime protection from possible malware.


This package has no dependencies.

Package Maintainer(s)

Software Author(s)

  • Heptio
  • Amazon EKS OSS Engineers


2017 the contributors


Release Notes

See the GitHub release.

Version History

Version Downloads Last updated Status

Discussion for the AWS IAM Authenticator for Kubernetes Package

Ground rules:

  • This discussion is only about AWS IAM Authenticator for Kubernetes and the AWS IAM Authenticator for Kubernetes package. If you have feedback for Chocolatey, please contact the google group.
  • This discussion will carry over multiple versions. If you have a comment about a particular version, please note that in your comments.
  • The maintainers of this Chocolatey Package will be notified about new comments that are posted to this Disqus thread, however, it is NOT a guarantee that you will get a response. If you do not hear back from the maintainers after posting a message below, please follow up by using the link on the left side of this page or follow this link to contact maintainers. If you still hear nothing back, please follow the package triage process.
  • Tell us what you love about the package or AWS IAM Authenticator for Kubernetes, or tell us what needs improvement.
  • Share your experiences with the package, or extra configuration or gotchas that you've found.
  • If you use a url, the comment will be flagged for moderation until you've been whitelisted. Disqus moderated comments are approved on a weekly schedule if not sooner. It could take between 1-5 days for your comment to show up.

comments powered by Disqus uses cookies to enhance the user experience of the site.