Nike-Inc / gimme-aws-creds
A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials
☆951Updated 11 months ago
Alternatives and similar repositories for gimme-aws-creds:
Users that are interested in gimme-aws-creds are comparing it to the libraries listed below
- A utility for easily assuming AWS IAM roles from the command line.☆548Updated 4 months ago
- AWS IAM linting library☆1,071Updated last month
- Okta AWS CLI Assume Role Tool☆337Updated last year
- Smooth out the rough edges of AWS SSO (temporarily, until AWS makes it better).☆990Updated 9 months ago
- Tool for converting AWS CloudFormation templates between JSON and YAML formats.☆1,000Updated 2 years ago
- A command-line tool to get valuable information out of AWS CloudTrail☆812Updated this week
- The easiest way to access your cloud.☆1,276Updated this week
- CLI tool for generating Terraform configuration and state for existing CloudFormation resources☆417Updated 2 years ago
- CLI tool which enables you to login and retrieve AWS temporary credentials using a SAML IDP☆2,126Updated this week
- Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy☆3,230Updated 3 weeks ago
- Small tool to convert an IAM Policy in JSON format into a Terraform aws_iam_policy_document☆789Updated this week
- Automatically tag AWS resources on creation, for cost assignment☆465Updated last year
- Provides AWS STS credentials based on Google Apps SAML SSO auth (what a jumble!)☆538Updated 9 months ago
- IAM Least Privilege Policy Generator☆2,072Updated 2 weeks ago
- Provides Okta authentication for awscli☆304Updated 7 months ago
- Extend your AWS IAM switching roles by Chrome extension, Firefox add-on, or Edge add-on☆1,361Updated 2 months ago
- Records actions made in the AWS Management Console and outputs the equivalent CLI/SDK commands and CloudFormation/Terraform templates.☆1,427Updated 4 years ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆895Updated 3 years ago
- Programmatically delete AWS resources based on an allowlist and time to live (TTL) settings☆496Updated 2 years ago
- CLI for managing secrets☆2,499Updated this week
- [MAMIP] Monitor AWS Managed IAM Policies Changes☆479Updated this week
- aws-vault like tool for Okta authentication☆535Updated 4 years ago
- Terraform module to create AWS resources for sending notifications to Slack 🇺🇦☆480Updated 2 weeks ago
- Discover resources created in an AWS account.☆718Updated last year
- Guard offers a policy-as-code domain-specific language (DSL) to write rules and validate JSON- and YAML-formatted data such as CloudForma…☆1,334Updated last week
- A tool for cleaning your AWS account☆481Updated 2 years ago
- Use Azure AD SSO to log into the AWS via CLI.☆621Updated 7 months ago
- Linting tool for CloudFormation templates☆1,274Updated 8 months ago
- Test all the CloudFormation things! (with TaskCat)☆1,185Updated last week
- Manage AWS MFA Security Credentials☆1,038Updated 8 months ago