Table: aws_iam_saml_provider - Query AWS IAM SAML Providers using SQL
The AWS IAM SAML Provider is a service that allows you to manage Identity Providers (IdPs) and Single Sign-On (SSO) to AWS accounts and applications using IAM roles. It enables the establishment of trust between your AWS account and your SAML 2.0 compatible IdP. This service simplifies access management for AWS resources by allowing users to log in to multiple accounts using a single set of credentials from the IdP.
Table Usage Guide
The aws_iam_saml_provider
table in Steampipe provides you with information about SAML providers within AWS Identity and Access Management (IAM). This table empowers you, as a DevOps engineer, to query SAML provider-specific details, including the provider's ARN, creation date, validity period, and the SAML metadata document. You can utilize this table to gather insights on SAML providers, such as provider validity, associated metadata, and more. The schema outlines for you the various attributes of the SAML provider, including the provider ARN, creation date, and validity period.
Examples
Basic info
Analyze the settings to understand the creation and validity dates of your AWS IAM SAML providers across various regions and accounts. This could help in managing the lifecycle of these providers and ensuring they are valid and up-to-date.
select arn, create_date, valid_until, region, account_idfrom aws_iam_saml_provider;
select arn, create_date, valid_until, region, account_idfrom aws_iam_saml_provider;
List providers older than 90 days
Determine the areas in which certain providers have been active for a prolonged period by identifying those that have been established for more than 90 days. This could be useful for auditing purposes or to identify potential areas for system optimization or updates.
select arn, create_date, valid_until, region, account_idfrom aws_iam_saml_providerwhere create_date <= (current_date - interval '90' day)order by create_date;
select arn, create_date, valid_until, region, account_idfrom aws_iam_saml_providerwhere create_date <= date('now', '-90 day')order by create_date;
List providers valid for less than 30 days
Determine the areas in which AWS Identity Access Management (IAM) Security Assertion Markup Language (SAML) providers have been valid for less than 30 days. This can be useful for managing and reviewing the lifespan of these providers for security and operational efficiency.
select arn, create_date, valid_until, region, account_idfrom aws_iam_saml_providerwhere valid_until <= (current_date - interval '30' day)order by valid_until;
select arn, create_date, valid_until, region, account_idfrom aws_iam_saml_providerwhere valid_until <= date('now', '-30 day')order by valid_until;
Schema for aws_iam_saml_provider
Name | Type | Operators | Description |
---|---|---|---|
_ctx | jsonb | Steampipe context in JSON form. | |
account_id | text | =, !=, ~~, ~~*, !~~, !~~* | The AWS Account ID in which the resource is located. |
akas | jsonb | Array of globally unique identifier strings (also known as) for the resource. | |
arn | text | = | The Amazon Resource Name (ARN) specifying the IAM policy. |
create_date | timestamp with time zone | The date and time when the SAML provider was created. | |
partition | text | The AWS partition in which the resource is located (aws, aws-cn, or aws-us-gov). | |
region | text | The AWS Region in which the resource is located. | |
saml_metadata_document | text | The XML metadata document that includes information about an identity provider. | |
sp_connection_name | text | =, !=, ~~, ~~*, !~~, !~~* | Steampipe connection name. |
sp_ctx | jsonb | Steampipe context in JSON form. | |
tags | jsonb | A map of tags for the resource. | |
tags_src | jsonb | A list of tags that are attached to the specified IAM SAML provider. | |
valid_until | timestamp with time zone | The expiration date and time for the SAML provider. |
Export
This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.
You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh
script:
/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- aws
You can pass the configuration to the command with the --config
argument:
steampipe_export_aws --config '<your_config>' aws_iam_saml_provider