steampipe plugin install aws

Table: aws_iam_saml_provider - Query AWS IAM SAML Providers using SQL

The AWS IAM SAML Provider is a service that allows you to manage Identity Providers (IdPs) and Single Sign-On (SSO) to AWS accounts and applications using IAM roles. It enables the establishment of trust between your AWS account and your SAML 2.0 compatible IdP. This service simplifies access management for AWS resources by allowing users to log in to multiple accounts using a single set of credentials from the IdP.

Table Usage Guide

The aws_iam_saml_provider table in Steampipe provides you with information about SAML providers within AWS Identity and Access Management (IAM). This table empowers you, as a DevOps engineer, to query SAML provider-specific details, including the provider's ARN, creation date, validity period, and the SAML metadata document. You can utilize this table to gather insights on SAML providers, such as provider validity, associated metadata, and more. The schema outlines for you the various attributes of the SAML provider, including the provider ARN, creation date, and validity period.

Examples

Basic info

Analyze the settings to understand the creation and validity dates of your AWS IAM SAML providers across various regions and accounts. This could help in managing the lifecycle of these providers and ensuring they are valid and up-to-date.

select
arn,
create_date,
valid_until,
region,
account_id
from
aws_iam_saml_provider;
select
arn,
create_date,
valid_until,
region,
account_id
from
aws_iam_saml_provider;

List providers older than 90 days

Determine the areas in which certain providers have been active for a prolonged period by identifying those that have been established for more than 90 days. This could be useful for auditing purposes or to identify potential areas for system optimization or updates.

select
arn,
create_date,
valid_until,
region,
account_id
from
aws_iam_saml_provider
where
create_date <= (current_date - interval '90' day)
order by
create_date;
select
arn,
create_date,
valid_until,
region,
account_id
from
aws_iam_saml_provider
where
create_date <= date('now', '-90 day')
order by
create_date;

List providers valid for less than 30 days

Determine the areas in which AWS Identity Access Management (IAM) Security Assertion Markup Language (SAML) providers have been valid for less than 30 days. This can be useful for managing and reviewing the lifespan of these providers for security and operational efficiency.

select
arn,
create_date,
valid_until,
region,
account_id
from
aws_iam_saml_provider
where
valid_until <= (current_date - interval '30' day)
order by
valid_until;
select
arn,
create_date,
valid_until,
region,
account_id
from
aws_iam_saml_provider
where
valid_until <= date('now', '-30 day')
order by
valid_until;

Schema for aws_iam_saml_provider

NameTypeOperatorsDescription
_ctxjsonbSteampipe context in JSON form.
account_idtext=, !=, ~~, ~~*, !~~, !~~*The AWS Account ID in which the resource is located.
akasjsonbArray of globally unique identifier strings (also known as) for the resource.
arntext=The Amazon Resource Name (ARN) specifying the IAM policy.
create_datetimestamp with time zoneThe date and time when the SAML provider was created.
partitiontextThe AWS partition in which the resource is located (aws, aws-cn, or aws-us-gov).
regiontextThe AWS Region in which the resource is located.
saml_metadata_documenttextThe XML metadata document that includes information about an identity provider.
sp_connection_nametext=, !=, ~~, ~~*, !~~, !~~*Steampipe connection name.
sp_ctxjsonbSteampipe context in JSON form.
tagsjsonbA map of tags for the resource.
tags_srcjsonbA list of tags that are attached to the specified IAM SAML provider.
valid_untiltimestamp with time zoneThe expiration date and time for the SAML provider.

Export

This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.

You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh script:

/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- aws

You can pass the configuration to the command with the --config argument:

steampipe_export_aws --config '<your_config>' aws_iam_saml_provider