☆24May 31, 2024Updated last year
Alternatives and similar repositories for aws-cognito-okta-federation
Users that are interested in aws-cognito-okta-federation are comparing it to the libraries listed below
Sorting:
- AWS SSO Reporter☆55May 7, 2025Updated 10 months ago
- This sample repositories provides an production ready example of enhancing AWS SSO for enterprise usage. We provide an automation for ass…☆16Jul 8, 2025Updated 8 months ago
- CDK project that leverages an OpenAPI definition to define, document and create an Amazon API Gateway deployment. At deploy time, a Cloud…☆11Dec 24, 2024Updated last year
- ☆26Mar 25, 2025Updated 11 months ago
- ☆14Mar 12, 2024Updated last year
- Tool for managing your CloudFormation☆17Updated this week
- Manage your AWS SSM parameters☆16Jul 26, 2019Updated 6 years ago
- This repository contains the reference architecture implementation for the AWS Serverless Developer Experience workshop in .NET☆19Updated this week
- ☆18Oct 8, 2024Updated last year
- An authentication API based on AWS Cognito☆20Feb 6, 2026Updated last month
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- This project contains the webapp sample integrated with AWS HealthOmics, which allows users such as admin and bioinformaticians to operat…☆19Nov 20, 2024Updated last year
- ☆35Oct 16, 2024Updated last year
- Security Alert Decoration☆27Jul 21, 2025Updated 7 months ago
- Centralizing AWS CloudWatch log forwarding via EventBridge and Step Functions☆48Feb 12, 2023Updated 3 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- ☆21Feb 22, 2023Updated 3 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆38Feb 16, 2026Updated 3 weeks ago
- Mini web site that uses a lambda function to search a host name or IP address in the list of AWS address ranges, see https://aws.amazon.c…☆53Jan 14, 2026Updated last month
- ☆57Mar 2, 2026Updated last week
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 3 weeks ago
- Sample CDK projects developed by AWS Professional Services (ProServe)☆18Jun 19, 2023Updated 2 years ago
- ☆21Feb 11, 2026Updated 3 weeks ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- Sample .NET Desktop App with Cognito User Pools☆49Oct 13, 2020Updated 5 years ago
- Generate IaC scripts from existing AWS resources with temporary security credentials☆29Jan 5, 2026Updated 2 months ago
- An SSH certificate authority framework to sign SSH pubkey requests based on SAML assertions☆28Mar 5, 2021Updated 5 years ago
- Functionless-based mini-framework for DynamoDB migrations in AWS CDK.☆25Aug 11, 2022Updated 3 years ago
- ☆31Nov 10, 2023Updated 2 years ago
- Application code and instruction files for the .NET Core-based CloudMosaic sample demonstrating modern .NET application development on AW…☆25Apr 15, 2024Updated last year
- ☆31Oct 28, 2024Updated last year
- ☆37Apr 9, 2025Updated 11 months ago
- ☆30Feb 7, 2026Updated last month
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆32Aug 29, 2023Updated 2 years ago
- Serverless Ops Review is an open source tool that automatically generates operational review and configuration reports about AWS serverle…☆31Jun 9, 2024Updated last year
- Example of a three-tier serverless web application using AWS CDK and React☆29Dec 27, 2021Updated 4 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆144May 1, 2025Updated 10 months ago