aws-samples / aws-iam-identity-center-automationLinks
Accelerate AWS IAM Identity Center (successor to AWS Single Sign-On (SSO)) implementation using AWS CDK. This CDK program allows you to conveniently define your own permission sets and assignments without the need to tediously create your own AWS CloudFormation templates for your AWS IAM Identity Center deployment minimizing the risk of human mi…
☆35Updated 2 years ago
Alternatives and similar repositories for aws-iam-identity-center-automation
Users that are interested in aws-iam-identity-center-automation are comparing it to the libraries listed below
Sorting:
- This solution will help you automate user group assignment to permission sets in AWS IAM Identity center for accessing any or all AWS acc…☆25Updated 6 months ago
- ☆141Updated 3 weeks ago
- This solution is intended for enterprises that need a streamlined way of managing user access to their AWS accounts. Using this solution,…☆70Updated 6 months ago
- Collection of samples for Management and Governance services☆69Updated 5 months ago
- Automated AWS Organizations configuration for security operations☆37Updated 7 months ago
- AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/☆124Updated 2 years ago
- The Network Orchestration for AWS Transit Gateway solution automates the process of setting up and managing transit networks in distribut…☆139Updated last week
- This Guidance demonstrates how to deploy Cloud Intelligence Dashboards in your AWS environment using AWS CloudFormation templates or comm…☆59Updated this week
- L3 construct that can be used to quickly deploy a complete EC2 Image Builder Image Pipeline☆44Updated last week
- Rules Registry for Compliance Frameworks☆132Updated last year
- This Guidance demonstrates how to analyze AWS Health events across multiple AWS accounts using natural language queries and generative bu…☆46Updated 3 months ago
- aws-solutions-library-samples / guidance-for-cross-network-traffic-inspection-with-aws-network-firewallThis Guidance demonstrates how to automate the deployment of centralized network security infrastructure that inspects and filters traffi…☆44Updated 2 weeks ago
- ☆143Updated last year
- This project provides a solution to AWS customers for reporting on what tags exists, the resources they are applied to, and what resource…☆23Updated last year
- Allow users to request temporary elevated access to your AWS environment☆129Updated last year
- AWS CloudFormation templates and Python code for AWS blog post on how to automate centralized backup at scale across AWS services using A…☆36Updated last year
- ☆36Updated 2 years ago
- ☆42Updated last year
- ☆16Updated last year
- ☆22Updated last year
- Policy Validator for AWS IAM Policies in CloudFormation templates☆11Updated 3 months ago
- Account Assessment for AWS Organizations programmatically scans all AWS accounts in an AWS Organization for identity-based and resource-b…☆41Updated this week
- ☆34Updated 3 years ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆181Updated 2 weeks ago
- The DevOps Monitoring Dashboard on AWS solution is a reference implementation that automates the process for monitoring and visualizing p…☆76Updated 9 months ago
- Automated AWS account hardening with AWS Control Tower and AWS Step Functions☆38Updated 6 months ago
- ☆57Updated last year
- This pattern describes how to use AWS Control Tower Controls, AWS Cloud Development Kit (CDK) and infrastructure as code to implement and…☆41Updated last week
- ☆145Updated 2 months ago
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆41Updated last year