Skip to content

Latest commit

 

History

History
16 lines (12 loc) · 907 Bytes

README.md

File metadata and controls

16 lines (12 loc) · 907 Bytes

aws-ssoreporting

Thank you very little AWS API team responsible for SSO. Background is here: aws/aws-sdk#109 I needed a down and dirty script to report AWS SSO users and groups. Why AWS makes this so hard is just beyond reason. To run this you need:

  1. A file with every email address in your directory. The CSV needs a header row. Put the email address column name in --colname paramter.
  2. AWS SSO automatic provsioning enabled. This enables the SCIM API for your SSO instance.
  3. AWS SSO SCIM URL stored in env variable URL. Found in the AWS SSO console.
  4. AWS SSO SCIM auth token stored in env variable SCIMTOKEN. Found in the AWS SSO console.

python aws-ssoreporting.py --infile=<emails_file> --outfile=<report_file> --colname=<email_addr_column_name>

Output rpt file is one row for every group a user is a member of like so:

email,firstname,lastname,groupname