Table: scaleway_iam_user - Query Scaleway IAM Users using SQL
Scaleway Identity and Access Management (IAM) is a service within Scaleway that helps manage access to Scaleway resources. It allows you to control who is authenticated and authorized to use resources. IAM makes it easy to manage users, security credentials, and permissions to access resources.
Table Usage Guide
The scaleway_iam_user
table provides insights into IAM users within Scaleway Identity and Access Management (IAM). As a DevOps engineer, explore user-specific details through this table, including permissions, roles, and associated metadata. Utilize it to uncover information about users, such as those with specific permissions, the roles assigned to each user, and the verification of user credentials.
Important Notes
- This table requires the
organization_id
config argument to be set.
Examples
Basic info
Explore the user profiles in your Scaleway IAM to understand their status and security settings. This can help identify if any users have an outdated login or if two-factor authentication is enabled, assisting in maintaining account security.
select email, created_at, last_login_at, id, status, two_factor_enabledfrom scaleway_iam_user
select email, created_at, last_login_at, id, status, two_factor_enabledfrom scaleway_iam_user
List all the users for whom MFA is not enabled
Explore which users have not activated Multi-Factor Authentication (MFA) to identify potential security risks and enhance user account protection measures.
select email, id, two_factor_enabledfrom scaleway_iam_userwhere not two_factor_enabled;
select email, id, two_factor_enabledfrom scaleway_iam_userwhere not two_factor_enabled;
List all the users not actived
Discover the segments that comprise users with an unknown status in the Scaleway IAM service. This allows you to pinpoint specific instances where user status may need investigation or clarification, enhancing your overall user management process.
select email, id, statusfrom scaleway_iam_userwhere status = 'unknown_status';
select email, id, statusfrom scaleway_iam_userwhere status = 'unknown_status';
List all the users never connected
Identify users who have never logged in to your system, which can help in assessing inactive accounts and potentially freeing up resources.
select email, id, last_login_atfrom scaleway_iam_userwhere last_login_at is null;` ` ` sql + sqliteselect email, id, last_login_atfrom scaleway_iam_userwhere last_login_at is null;
Schema for scaleway_iam_user
Name | Type | Operators | Description |
---|---|---|---|
_ctx | jsonb | Steampipe context in JSON form. | |
created_at | timestamp with time zone | The time when the key was created. | |
deletable | boolean | The deletion status of user. Owner user cannot be deleted. | |
text | The email of user. | ||
id | text | = | ID of user. |
last_login_at | timestamp with time zone | The last login date. | |
organization | text | The ID of the organization where the server resides. | |
sp_connection_name | text | =, !=, ~~, ~~*, !~~, !~~* | Steampipe connection name. |
sp_ctx | jsonb | Steampipe context in JSON form. | |
status | text | The status of invitation for the user. | |
title | text | Title of the resource. | |
two_factor_enabled | boolean | The 2FA enabled. | |
type | jsonb | The type of the user. | |
updated_at | timestamp with time zone | The time when the key was last updated. |
Export
This table is available as a standalone Exporter CLI. Steampipe exporters are stand-alone binaries that allow you to extract data using Steampipe plugins without a database.
You can download the tarball for your platform from the Releases page, but it is simplest to install them with the steampipe_export_installer.sh
script:
/bin/sh -c "$(curl -fsSL https://steampipe.io/install/export.sh)" -- scaleway
You can pass the configuration to the command with the --config
argument:
steampipe_export_scaleway --config '<your_config>' scaleway_iam_user