SAML.to
  • Introduction
  • Installation
  • Configuration
    • Identity Providers
      • GitHub
    • Service Providers
      • AWS (Federated Roles)
        • Assuming Roles
          • AWS CLI
          • AWS SDKs
          • Docker
          • Terraform
          • Kubernetes
        • Adding Users
        • Adding AWS Accounts
        • Adding Roles
        • Roles for GitHub Actions
    • Configuration Reference
      • Substitutions
  • FAQs
  • Usage
    • CLI
      • login
      • assume
      • list-roles
    • GitHub Actions
      • Assume AWS Role Action
      • Config Sync Action
  • Advanced Usage
    • AWS
      • CloudWatch Dashboard Sharing
Powered by GitBook
On this page
  • Ready to Get Started?
  • Questions/Comments/Issues?

Introduction

NextInstallation

Last updated 2 years ago

Welcome to SAML.to!

SAML.to is a bridge between Identity Providers (such as GitHub OAuth) and Service Providers (such as AWS) using the SAML 2.0 Protocol.

It works by adding a configuration file to any repository of your choice called .

The configuration file defines Service Providers (such as AWS) and their configuration.

Also in the configuration file is lists of users that are allowed to access each Service Provider.

Using the SAML.to CLI, users can to assume roles at those services.

Here's an , Stark International

Ready to Get Started?

. This will guide you installing our GitHub application and adding the saml-to.yml configuration file to your repository.

Once all set up, granting or removing access to roles is completed by editing the file.

Users granted in the saml-to.yml configuration file can visit https://saml.to/apps or by using the saml-to assume command to assume their granted roles.

See for more details.

Questions/Comments/Issues?

Please !

saml-to.yml
assume
Example Configuration file for our Demo Organization
Getting started is easy
Installation
Contact Us