-
Updated
Mar 2, 2022 - Python
iam
Here are 683 public repositories matching this topic...
-
Updated
Mar 22, 2022 - Shell
-
Updated
Mar 23, 2022 - Go
-
Updated
Mar 23, 2022 - Go
-
Updated
Mar 24, 2022 - Go
-
Updated
Mar 1, 2022 - Python
- There are still mentions of a triage worksheet. "Cloudsplaining identifies violations of least privilege in AWS IAM policies and generates a pretty HTML report with a triage worksheet. It can scan all the policies in your AWS account or it can scan a single policy file." The worksheet is mentioned several times.
- As shown in the above, there is no mention of multiple AWS accounts
- The GIF st
-
Updated
Mar 7, 2022 - Go
-
Updated
Feb 5, 2022 - Python
-
Updated
Jun 21, 2019 - TypeScript
-
Updated
Dec 7, 2021 - Shell
-
Updated
Mar 24, 2022
-
Updated
Jan 20, 2022
-
Updated
Mar 22, 2022 - Java
#22 introduced a feature to guess actions that are similar to an existing policy. It currently doesn't support all actions.
Here's things I currently know are missing (comment if you find more):
- KMS:
Encrypt,Decrypt,GenerateDataKey, ... - ECR:
BatchDeleteImage,BatchGetImage, ... -
*Deregister* -
*Modify* -
*Remove* - API Gateway: (
DELETE,
-
Updated
Dec 19, 2021 - Java
Usually, we probably want to copy the output of the conversion back into our IDE. Explore what we can do to make this easier.
One idea would be to use the toolbar and copy-to-clipboard Prism plugins for this
running airiam recommend_groups, in MAC gives this error
`INFO:botocore.credentials:Found credentials in shared credentials file: ~/.aws/credentials
Reusing local data
INFO:root:Analyzing data for account 051349106950
INFO:root:Using the default UserOrganizer
Traceback (most recent call last):
File "/usr/local/bin/airiam", line 5, in
run()
File "/usr/local/Cellar/airiam/
-
Updated
Mar 22, 2022 - Java
-
Updated
Mar 23, 2022 - HCL
After creating a custom login policy, the active identity providers are still listed from default. Same ist for MFA and 2FA, ...
From the screenshots below, you can see that the new policy is loaded after creation and reset. But only the policy itself and not the identity providers and factors:
![image](https://user-images.githubusercontent.com/9405495/143998582-86d03161-287f-4448-b0e4-feca882
-
Updated
Mar 24, 2022 - C#
-
Updated
Mar 24, 2022 - TypeScript
-
Updated
Aug 25, 2021 - Python
-
Updated
Dec 31, 2021
-
Updated
Mar 23, 2022 - TypeScript
Improve this page
Add a description, image, and links to the iam topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the iam topic, visit your repo's landing page and select "manage topics."