Univention Corporate Server is a preconfigured, 100% open source Linux server and IT management system. It is free of charge and perfect for providing Microsoft Server-like services on the cloud or on the premises, to run and operate corporate IT environments with Windows- and Linux-based clients and to extend those environments with proven enterprise software, also either on the cloud or on the premises.
server-management identity-access-management iam ldap active-directory samba multi-factor-authentication single-sign-on aws domain-management operating-system it-infrastructure iaasA curated list of awesome AWS libraries, open source repos, guides, blogs, and other resources.Inspired by the awesome list.
aws cloud aws-sdk aws-cli cloudformation cloudwatch dynamodb elasticsearch kinesis lambda serverless machine-learning redshift s3 ec2 iam rds route53 ecs cloud-managementSecurely store and access credentials for AWS. AWS Vault stores IAM credentials in your operating systems secure keystore and then generates temporary credentials from those to expose to your shell and applications. It's designed to be complementary to the aws cli tools, and is aware of your profiles and configuration in ~/.aws/config. Check out the announcement blog post for more details.
aws iam temporary-credentials keychain credentials cliA tool to use AWS IAM credentials to authenticate to a Kubernetes cluster. The initial work on this tool was driven by Heptio. The project recieves contributions from multiple community engineers and is currently maintained by Heptio and Amazon EKS OSS Engineers. If you are an administrator running a Kubernetes cluster on AWS, you already need to manage AWS IAM credentials to provision and update the cluster. By using AWS IAM Authenticator for Kubernetes, you avoid having to manage a separate credential for Kubernetes access. AWS IAM also provides a number of nice properties such as an out of band audit trail (via CloudTrail) and 2FA/MFA enforcement.
kubernetes iam aws auth k8s-sig-awsIAM Least Privilege Policy Generator. For walkthroughs and full documentation, please visit the project on ReadTheDocs.
aws security cloud iam salesforce hacktoberfest aws-security iam-policy cloudsecurityCloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized HTML report. For full documentation, please visit the project on ReadTheDocs.
aws security cloud iam salesforce aws-iam hacktoberfest aws-security cloud-securityPomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.
reverse-proxy iam beyondcorp identity identity-aware-proxy proxyZITADEL provides you with all the features necessary to build great solutions, without the need of building the login and access management yourself.
authentication user-management auth0-alternative kubernetes security identity jwt oauth2 angular cqrs iam auth event-sourcing sso cloud-native openid-connect oidc identity-provider access-control single-sign-onSpaceFinder is a reference mobile app that allows users to book conference rooms, work desks, and other shared resources. The app showcases serverless authentication and authorization using the AWS platform.The mobile front-end is built using the Ionic 3 framework and client libraries to call AWS services and mobile backend APIs. The backend APIs themselves are powered by AWS services. The backend APIs are built using a serverless architecture, which makes it easy to deploy updates, and it also means that there are no servers to operationally manage.
amazon-cognito aws-cognito serverless iam serverless-architectures aws-lambda cognito cognito-quickstart authentication authorization auth amazon-api-gateway aws aws-apigatewayAirIAM is an AWS IAM to least privilege Terraform execution framework. It compiles AWS IAM usage and leverages that data to create a least-privilege IAM Terraform that replaces the exiting IAM management method. AirIAM was created to promote immutable and version-controlled IAM management to replace today's manual and error prone methods.
aws terraform iam aws-iam aws-security aws-security-automation bridgecrew privileges-modelA small utility to sign vanilla node.js http(s) request options using Amazon's AWS Signature Version 4.Can also be used in the browser.
amazon aws signature s3 ec2 autoscaling cloudformation elasticloadbalancing elb elasticbeanstalk cloudsearch dynamodb kinesis lambda glacier sqs sns iam sts ses swf storagegateway datapipeline directconnect redshift opsworks rds monitoring cloudtrail cloudfront codedeploy elasticache elasticmapreduce elastictranscoder emr cloudwatch mobileanalytics cognitoidentity cognitosync cognito containerservice ecs appstream keymanagementservice kms config cloudhsm route53 route53domains logsCurrently Spring Security SAML module doesn't provide a starter for Spring Boot. Moreover, its configuration is XML-based as of this writing. The aim of this project is to explain how to develop a Service Provider (SP) which uses Spring Boot and Spring Security SAML Extension, by defining an annotation-based configuration (Java Configuration). Thymeleaf is also used as template engine.
spring-boot saml sso authentication spring-security-saml spring iam identityWARNING: aws2js is deprecated. Use aws-sdk instead. Amazon Web Services node.js module. Originally a fork of aws-lib.
amazon aws rest api https query-api ec2 rds ses elb s3 iam auto-scaling cloudwatch elasticache sqs simpledb sdb security-token-service sts dynamodb sns emr elastic-mapreducePyark is a small python-based CLI tool, which allows you to interact with the CyberArk Enterprise Password Vault API.Furthermore it's important to know which version of the CyberArk Password Vault is used as only the newest versions expose all API endpoints. Make sure to double check the API documentation, specific for your version, in case the tool fails to interact with the API.
cli credentials security api-client automation cyberark iamA collection of process-based credential providers to be used with the AWS CLI and related tools.This will cache your credentials by default, which will allow you to run multiple commands without having to enter your password each time. You can disable the cache by specifying --no-cache.
aws aws-cli cloud credential-provider sts saml2 okta adfs iam iam-credentialsThis is a set of scripts used to auth users connecting via SSH with IAM.
aws iam ssh authenticationIAMy is a tool for dumping and loading your AWS IAM configuration into YAML files. This allows you to use an Infrastructure as Code model to manage your IAM configuration, and allows you to operate configuration and change management on a higher level. For example, you might use a github repo with a pull request model for changes.
iam aws cli devopsAegea is a command line interface (CLI) that provides a set of essential commands and terminal dashboards for operators of Amazon Web Services (AWS) accounts. Aegea lets you build AMIs and Docker images using the cloud-init config management package, manage config roles, launch and monitor instances and services, and manage AWS resources including ELB, RDS, and AWS Batch. It is intended to be used in conjunction with the existing functionality of the AWS CLI and boto3. Run aws configure to configure IAM access credentials that will be used by the aws and aegea commands. You can create a new IAM key at https://console.aws.amazon.com/iam/home#/users.
aws cli ec2 iam docker ecs aws-batch cloud-init aws-consoleKeymaker is the missing link between SSH and IAM accounts on Amazon AWS. It's a stateless synchronization engine that securely manages the process of SSH public key sharing and verification, user and group synchronization, and home directory sharing (via optional EFS integration). You, the AWS account administrator, define or import user and group identities in IAM, and instances in your account dynamically retrieve and use those identities to authenticate your users. Keymaker is the modern, minimalistic alternative to LDAP or Active Directory authentication. Run pip install keymaker.
ec2 ssh iamkiam runs as an agent on each node in your Kubernetes cluster and allows cluster users to associate IAM roles to Pods. Docker images are available at https://quay.io/repository/uswitch/kiam.
kubernetes iam aws-iam iam-role
We have large collection of open source products. Follow the tags from
Tag Cloud >>
Open source products are scattered around the web. Please provide information
about the open source projects you own / you use.
Add Projects.