Skip to content

Hacked together Python script that uses the SCIM protocol to get a report of AWS SSO users and associated group membership

Notifications You must be signed in to change notification settings

dustintodd123/aws-ssoreporting

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 
 
 

Repository files navigation

aws-ssoreporting

Thank you very little AWS API team responsible for SSO. Background is here: aws/aws-sdk#109 I needed a down and dirty script to report AWS SSO users and groups. Why AWS makes this so hard is just beyond reason. To run this you need:

  1. A file with every email address in your directory. The CSV needs a header row. Put the email address column name in --colname paramter.
  2. AWS SSO automatic provsioning enabled. This enables the SCIM API for your SSO instance.
  3. AWS SSO SCIM URL stored in env variable URL. Found in the AWS SSO console.
  4. AWS SSO SCIM auth token stored in env variable SCIMTOKEN. Found in the AWS SSO console.

python aws-ssoreporting.py --infile=<emails_file> --outfile=<report_file> --colname=<email_addr_column_name>

Output rpt file is one row for every group a user is a member of like so:

email,firstname,lastname,groupname

About

Hacked together Python script that uses the SCIM protocol to get a report of AWS SSO users and associated group membership

Topics

Resources

Stars

Watchers

Forks

Languages