Latest Updates!Learn More

IAM

Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.

Explore 83 curated cybersecurity tools, with 15,390 visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Policy Sentry IAM Least Privilege Policy Generator Logo

Policy Sentry is an automated IAM policy generator that helps developers create least privilege AWS IAM policies through a template-based workflow.

0
AWS Lambda - IAM Access Key Disabler Logo

A Lambda function that automatically disables AWS IAM User Access Keys after a specified time period to reduce security risks from aging credentials.

0
Aaia Logo

Aaia visualizes AWS IAM and Organizations data in Neo4j graph format to help identify security outliers and conduct privilege escalation analysis through Cypher queries.

0
Certbot Logo

Certbot is a free tool for automatically enabling HTTPS on websites using Let's Encrypt certificates.

0
IAM Zero Logo

IAM Zero detects identity and access management issues and automatically suggests least-privilege policies by analyzing application errors and access patterns in cloud environments.

0
IAMSpy Logo

IAMSpy is a library that uses the Z3 prover to analyze AWS IAM policies and query whether specific actions are allowed or denied.

0
GPG Sync Logo

GPG Sync is a tool designed to keep OpenPGP public keys up-to-date within an organization by offloading the complexity of key management to a single trusted person.

0
Two-Factor Authentication for SSH Login on Linux Logo

This tutorial describes how to set up two-factor authentication for an SSH server by integrating Google Authenticator with OpenSSH.

0
Repokid Logo

Repokid automatically removes unused service permissions from AWS IAM role inline policies using Access Advisor data to implement least privilege access.

0
Cert Spotter Logo

A Certificate Transparency log monitor that alerts users when SSL/TLS certificates are issued for their domains, helping detect unauthorized certificate issuance and potential security threats.

0
AWS IAM Identity Center Logo

Centralized workforce identity management for AWS applications.

0
league/oauth2-server Logo

A PHP OAuth 2.0 authorization server implementation with support for various grants and RFCs.

0
Passpie Logo

A command-line password manager that encrypts credentials using GnuPG and stores them in YAML files with git synchronization support.

0
CRT sh Logo

Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.

0
AWS Certificate Manager Logo

Provision, manage, and renew SSL/TLS certificates for your AWS resources with AWS Certificate Manager.

0
Bitwarden Logo

Secure and manage passwords across devices with Bitwarden's open-source, encrypted password manager.

0
Pass the Hash Guidance Logo

Project hosting scripts for implementing Pass the Hash mitigations with PtHTools module commands.

0
kube2iam Logo

kube2iam provides IAM credentials to Kubernetes containers by intercepting EC2 metadata API calls and retrieving temporary AWS credentials based on pod annotations.

0
AD Build Script Logo

An automated script that configures Active Directory domains using customizable XML configuration files.

0
Active Directory Control Paths Logo

A tool for analyzing and visualizing control relationships and privilege escalation paths within Active Directory environments using graph-based representations.

0
AWS IAM Policy Generator for AWS CDK Logo

A NodeJS/TypeScript library that generates IAM Policy Actions Statements for AWS services with predefined constants and factory classes for AWS CDK integration.

0
BeyondTrust Privileged Access Management (PAM) Logo

BeyondTrust Privileged Access Management (PAM) provides comprehensive security controls for privileged accounts and users.

0
helm-secrets Logo

A Helm plugin that decrypts encrypted value files using sops encryption and integrates with cloud secret managers for secure secrets management in Kubernetes deployments.

0
Kiam Logo

Kiam is a Kubernetes agent that allows Pods to assume AWS IAM roles, though it is being deprecated in favor of AWS' official IAM roles for Service Accounts solution.

0

IAM Tools - FAQ

Common questions about IAM tools including selection guides, pricing, and comparisons.

Identity and Access Management solutions for identity governance, access control, authentication, privileged access management, and zero trust security.

Have more questions? Browse our categories or search for specific tools.