Claude-skill-registry aws-sso-refresh
Automatically refresh AWS SSO authentication tokens when encountering expiration errors. Use when AWS MCP tools fail due to expired SSO sessions.
git clone https://github.com/majiayu000/claude-skill-registry
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/aws-sso-refresh" ~/.claude/skills/majiayu000-claude-skill-registry-aws-sso-refresh && rm -rf "$T"
skills/data/aws-sso-refresh/SKILL.mdAWS SSO Token Refresh
You are an expert at handling AWS SSO authentication token expiration and refresh.
When to Use This Skill
Activate this skill when you encounter AWS SSO token expiration errors, such as:
- "Token has expired and refresh failed"
- "Error when retrieving token from sso"
- "The SSO session associated with this profile has expired"
- "ExpiredTokenException"
- Any AWS MCP tool failures mentioning authentication or token issues
How to Refresh
Use the
mcp__aws-sso__refresh_aws_sso_token tool. It automatically:
- Looks up the correct AWS profile from MCP config files
- Initiates the SSO login flow
- Opens a browser for authentication
Option 1: Pass the Server Name (Recommended)
When an MCP tool fails, pass the server name to automatically find the correct profile:
mcp__aws-sso__refresh_aws_sso_token(server: "bedrock-kb")
The tool searches multiple MCP client configs (Claude Code, Claude Desktop, Cursor, VS Code, Gemini CLI, etc.) to find the
AWS_PROFILE for that server.
Option 2: Pass the Profile Directly
If you know the profile name:
mcp__aws-sso__refresh_aws_sso_token(profile: "MCPServerReadAccess")
Note: At least one of
server or profile must be provided. The tool does not use a default profile to prevent unintended authentication actions.
Workflow
When an AWS MCP operation fails due to expired tokens:
-
Identify the failing MCP server: Note which tool failed (e.g.,
→ server ismcp__bedrock-kb__*
)bedrock-kb -
Call the refresh tool with the server name:
mcp__aws-sso__refresh_aws_sso_token(server: "bedrock-kb") -
Inform the user: "Your AWS SSO session has expired. Please complete the authentication in your browser."
-
Wait for completion: The tool will return success/failure status
-
Retry the operation: Once refreshed, retry the original AWS operation
Example
Tool
fails:mcp__bedrock-kb__ListKnowledgeBases
Error: Token has expired and refresh failed
Response:
mcp__aws-sso__refresh_aws_sso_token(server: "bedrock-kb")
Result:
{ "success": true, "profile": "MCPServerReadAccess", "profileSource": "mcp_config", "message": "Successfully refreshed SSO token for profile \"MCPServerReadAccess\"." }
Then retry
ListKnowledgeBases.
Supported MCP Clients
The tool automatically searches these config locations:
| Client | Config Location |
|---|---|
| Claude Code | |
| Claude Desktop | Platform app support directory |
| Cursor | |
| VS Code | |
| Gemini CLI | |
| Copilot CLI | |
| Amazon Q | |
| Cline | VS Code extension settings |
Proactive Behavior
- Automatically detect token expiration errors
- Use the
parameter to find the correct profile automaticallyserver - If profile lookup fails, always ask the user which profile to use before retrying
- Never call the tool without a
orserver
parameterprofile - Keep the user informed about authentication status
Important Notes
- SSO login opens a browser window - ensure user can access it
- Tokens typically expire after several hours
- Multiple MCP servers may share the same profile
- After refresh, all servers using that profile will work again
- The tool has a 2-minute timeout for browser authentication