Cloud Infrastructure Integration

AWS IAM

Connect TigerIdentity to AWS IAM for comprehensive identity and access management across all your AWS accounts with just-in-time privilege provisioning.

Key Features

Multi-Account Support

Sync IAM data across all AWS accounts in your organization with automatic discovery.

IAM Entities

Track users, roles, groups, and policies across your entire AWS estate.

Access Keys

Monitor IAM access keys, rotation status, and last usage timestamps.

Assume Role Chains

Map role assumption paths and cross-account trust relationships.

CloudTrail Events

Stream CloudTrail events for real-time visibility into AWS API activity.

Just-In-Time Access

Dynamically create and revoke IAM roles based on TigerIdentity policies.

How It Works

1

Create IAM Role

Deploy a cross-account IAM role with read permissions for IAM and CloudTrail.

2

Discover Accounts

TigerIdentity automatically discovers all accounts in your AWS Organization.

3

Sync IAM Data

Continuous sync of users, roles, groups, policies, and access keys across all accounts.

4

Provision Access

Create temporary IAM roles on-demand based on policy evaluation and approval workflows.

Configuration Example

connector:
  type: aws-iam
  name: "aws-production"

  config:
    role_arn: "arn:aws:iam::123456789012:role/TigerIdentityAccess"
    external_id: "${AWS_EXTERNAL_ID}"
    regions:
      - us-east-1
      - us-west-2

  sync:
    users: true
    roles: true
    groups: true
    policies: true
    access_keys: true

  events:
    cloudtrail: true
    event_types:
      - AssumeRole
      - GetSessionToken
      - CreateAccessKey
      - DeleteAccessKey

  provisioning:
    enabled: true
    role_prefix: "TigerIdentity-"
    max_session_duration: 3600

Use Cases

Zero Standing Privilege

Eliminate permanent IAM roles. Grant just-in-time access based on real-time context.

Cross-Account Access

Centralize multi-account access control without federation complexity.

Credential Rotation

Automatically detect and alert on stale access keys and long-lived credentials.

Least Privilege Enforcement

Analyze actual IAM usage and recommend right-sized policies.

Ready to connect AWS IAM?

See how TigerIdentity transforms AWS access management in a personalized demo.

Schedule Your Demo