Keep your AWS Single Sign-On (SSO) groups and users in sync with your Google Workspace directory
☆103Updated this week
Alternatives and similar repositories for idp-scim-sync
Users that are interested in idp-scim-sync are comparing it to the libraries listed below
Sorting:
- Populate AWS SSO directly with your G Suite users and groups using either a CLI or AWS Lambda☆626Jan 20, 2026Updated last month
- Force CloudFormation to generate a tree view for any stack☆18Sep 14, 2022Updated 3 years ago
- Daily Updates of AWS IAM Data☆22Updated this week
- Scans IAM Policies and Roles for Possible Security Issues☆15May 23, 2022Updated 3 years ago
- Configure a new AWS Account with security best practices☆21Apr 13, 2024Updated last year
- This Guidance demonstrates how to automate the deployment of centralized network security infrastructure that inspects and filters traffi…☆46Feb 11, 2026Updated 2 weeks ago
- OCSF Schema Validation☆13Dec 13, 2024Updated last year
- ☆12Aug 15, 2023Updated 2 years ago
- Using Mozilla SOPS and Terraform to create secrets in AWS Secrets Manager☆10Jul 23, 2019Updated 6 years ago
- Serverless Form Handler - accepts a form submission from a webpage, saving the data to a DynamoDB table and sending an email via SES.☆13Sep 19, 2022Updated 3 years ago
- A CLI tool for working with IaC in AWS Proton☆15Jun 28, 2023Updated 2 years ago
- The open source version of the AWS Control Tower docs. You can submit feedback & requests for changes by submitting issues in this repo o…☆27Jun 16, 2023Updated 2 years ago
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆34Feb 12, 2026Updated 2 weeks ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆267Jan 26, 2023Updated 3 years ago
- Convert JSON IAM Policies to other formats☆25Updated this week
- ☆11Mar 26, 2018Updated 7 years ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆17Jan 21, 2026Updated last month
- PHP application that supports both SCIM 1.1 and SCIM 2.0 servers with operations for /Users, /Groups and /ServiceProviderConfig endpoints…☆16Mar 22, 2021Updated 4 years ago
- AWS CloudFormation Template concrete types for the Go programming language.☆15Jan 25, 2018Updated 8 years ago
- ☆18Sep 10, 2025Updated 5 months ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Open-source proof-of-concept client for AWS IAM Roles Anywhere☆71Sep 16, 2022Updated 3 years ago
- Tool for obfuscating and deobfuscating data.☆76Mar 20, 2024Updated last year
- Scripts and IaC to create a ransomware resilient AWS Backup System☆16Sep 5, 2023Updated 2 years ago
- Starter kit: Re-implementation of the AWS Amplify CLI in CDK☆17May 14, 2022Updated 3 years ago
- Adds multi profile/account, mfa and aws sso support to cdk apps☆45Jul 18, 2023Updated 2 years ago
- Typical use cases of opensearch serverelss: search, time-series, kinesis firehose integration, securing with VPC☆19Jun 10, 2025Updated 8 months ago
- How to use AWS AppSync for simple websocket pub/sub☆19Jan 5, 2023Updated 3 years ago
- Kubernetes operator to manage aws-auth ConfigMap for AWS EKS☆18Sep 23, 2023Updated 2 years ago
- ☆23Feb 20, 2023Updated 3 years ago
- This is a sample solution that demonstrates how to use AWS IAM Identity Center with Neptune to visualize and map relationships between id…☆33Nov 27, 2025Updated 3 months ago
- Use Step Functions Distributed Map to run massively parallel DynamoDB migrations in AWS CDK☆22Dec 5, 2022Updated 3 years ago
- ☆23Feb 14, 2025Updated last year
- Scalable integrity framework for ABAC on AWS☆56Mar 14, 2025Updated 11 months ago
- Safer AWS SCP deployments via real-time monitoring☆56Sep 30, 2023Updated 2 years ago
- pandoc precompiled binary for AWS Lambda with a Node.js wrapper☆48Jun 19, 2019Updated 6 years ago
- AWS SSO Reporter☆55May 7, 2025Updated 9 months ago
- ☆22Oct 18, 2023Updated 2 years ago
- The Sensitive Data Protection on AWS solution allows enterprise customers to create data catalogs, discover, protect, and visualize sensi…☆124Feb 6, 2025Updated last year