Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy
-
Updated
Feb 28, 2024 - Go
Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy
A consolidated cloud IAM dataset
A python application that leverages Microsoft Azure to build a fully functional trading system.
Access AKS clusters using Azure Workload Identity Federation
An Azure DevOps extension to simplify use of Sheriff, a command line tool to manage Microsoft Entra Privileged Identity Management (Microsoft Entra PIM) using desired state configuration.
Exploring Azure policy, access control, and management group deployments as-code
This repository documents changes to Azure RBAC roles, by periodically fetching the definitions of the roles using Get-AzRoleDefinition and committing the results to this repository.
Add a description, image, and links to the azure-rbac topic page so that developers can more easily learn about it.
To associate your repository with the azure-rbac topic, visit your repo's landing page and select "manage topics."