AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/
-
Updated
Apr 17, 2023 - Python
AWS IAM Permissions Guardrails https://aws-samples.github.io/aws-iam-permissions-guardrails/
A practical playground where developers can explore Auth0's features, learn best practices, and integrate Auth0 seamlessly into their applications
The rust based IAM backend
Dockerization of SailPoint IdentityIQ - A fast and convenient way to educate your-self or experience the new versions of the product before executing the production migration
IAM Insights Reporting Dashboard — IAM Metrics
Javascript SDKs to integrate with WSO2 Identity Server
Effortlessly capture and manage access tokens with Azure Device Code integration. Simplify authentication workflows in Python with TokenFlow's seamless and secure token handling. Ideal for developers seeking streamlined, scalable access token solutions.
Attacking and Defending AWS
"A secure Policy-as-Code platform leveraging Flask and Open Policy Agent (OPA) to enforce scalable, real-time authorization decisions using externalized policies."
Active Directory lab: OU design, user/group provisioning, and delegated administration with least-privilege validation.
Learning repository documenting cybersecurity fundamentals through Google Cybersecurity Certificate, TryHackMe labs, and network/IAM exercises.
A high-performance, asynchronous Identity and Access Management (IAM) API built in Rust. Features stateless JWTs, stateful refresh token rotation, Argon2id hashing, and Redis-backed rate limiting.
AI agent credential broker — temporary, task-scoped tokens with automatic revocation. Free for internal use
Active Directory home lab built on Windows Server 2022, simulating an enterprise environment with custom Organizational Unit design, PowerShell user and group management, and Group Policy security hardening.
An Identity Access Manager microservice
Hands-on Microsoft Entra ID project demonstrating user management, security groups, group-based licensing, and structured access troubleshooting.
Learning log for Google Cybersecurity Certificate with IAM focus
This project presents a dynamic, risk-based approach to identity security using risk-scoring algorithms for five real-time use cases. By applying zero-trust principles, sign-in logs are analyzed for anomalies, classifying users and devices as risky or safe. Results are displayed on a dashboard, enabling security admins to make informed decisions.
This web application demonstrates Identity and Access Management principles.
identification, exploitation, and remediation of OWASP API Top 10 vulnerabilities
Add a description, image, and links to the identity-and-access-management topic page so that developers can more easily learn about it.
To associate your repository with the identity-and-access-management topic, visit your repo's landing page and select "manage topics."