What is allows GitHub Users and Repositories to assume AWS IAM Roles.
The differences between other similar services and SAML to is:
  • We do not maintain a database of users, passwords or tokens, we rely on GitHub to do so
  • Relationship of Users and Roles is maintained in a Configuration File checked into a GitHub Repository
  • We offer a Developer Friendly CLI and GitHub actions for assuming roles.

Who can use

From individuals to enterprises. works for anyone with one or more AWS Accounts, AWS Roles, GitHub Organizations, Teams and Users.

How do I validate that the saml-to.yml is correct?

Check out the Config Sync Action.

How is this different OpenID Connect in GitHub Actions?

The OpenID Connect feature for GitHub is exclusively for Repositories in GitHub Actions. does this as well, in addition to:
  • Allow Users to assume the same roles on their laptop with a developer friendly CLI
  • Multiple Role Assumptions in a Single Action Run

Do I have to type the full Role ARN for a saml-to assume command?

How do I assume multiple roles at the same time?

Have another question?

Last modified 25d ago