SkillAgentSearch skills...

Ssosync

Populate AWS SSO directly with your G Suite users and groups using either a CLI or AWS Lambda

Install / Use

/learn @awslabs/Ssosync
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

SSO Sync

Github Action <a href='https://github.com/jpoles1/gopherbadger' target='_blank'>gopherbadger-tag-do-not-edit</a> Go Report Card License Apache 2 AWS SDK v2 Taylor Swift Built with Kiro

Seamlessly synchronize Google Workspace users and groups to AWS IAM Identity Center

SSO Sync is a powerful CLI tool and AWS Lambda function that enables automatic provisioning of Google Workspace (formerly G Suite) users and groups into AWS IAM Identity Center (formerly AWS SSO). Built with Go and powered by AWS SDK v2, it provides reliable, scalable, and secure identity synchronization.

✨ Key Features

  • 🔄 Bi-directional Sync: Supports both groups and users_groups sync methods
  • 🎯 Advanced Filtering: Flexible user and group filtering with Google API query parameters
  • 🛡️ Dry-Run Mode: Test synchronization without making actual changes
  • ⚡ High Performance: Built with AWS SDK v2 for improved performance and reliability
  • 🔧 Multiple Deployment Options: CLI, AWS Lambda, or AWS SAM deployment
  • 📊 Comprehensive Logging: Structured logging with configurable levels and formats
  • 🧪 Extensive Testing: 61%+ test coverage with comprehensive test suite
  • 🔐 Secure: AWS Secrets Manager integration for credential management
  • 📈 Scalable: Supports large directories with user caching and pagination

🚀 Quick Start

Want to dive straight in? Try this hands-on lab from the AWS Control Tower Workshop. The lab guides you through the complete setup process for both AWS and Google Workspace using the recommended Lambda deployment from the AWS Serverless Application Repository.

Installation Options

| Method | Best For | Setup Time | |--------|----------|------------| | AWS Serverless App Repository | Production use | 5 minutes | | CLI Binary | Local testing, CI/CD | 2 minutes | | AWS SAM | Custom deployments | 10 minutes |

Why?

As per the AWS SSO Homepage:

AWS Single Sign-On (SSO) makes it easy to centrally manage access to multiple AWS accounts and business applications and provide users with single sign-on access to all their assigned accounts and applications from one place.

Key part further down:

With AWS SSO, you can create and manage user identities in AWS SSO's identity store, or easily connect to your existing identity source including Microsoft Active Directory and Azure Active Directory (Azure AD).

AWS SSO can use other Identity Providers as well... such as Google Apps for Domains. Although AWS SSO supports a subset of the SCIM protocol for populating users, it currently only has support for Azure AD.

This project provides a CLI tool to pull users and groups from Google and push them into AWS SSO. ssosync deals with removing users as well. The heavily commented code provides you with the detail of what it is going to do.

⚠️ Important Notices

[!CAUTION] When using ssosync with an instance of IAM Identity Center integrated with AWS Control Tower. AWS Control Tower creates a number of groups and users (directly via the Identity Store API), when an external identity provider is configured these users and groups are can not be used to log in. However it is important to remember that because ssosync implemements a uni-directional sync it will make the IAM Identity Store match the subset of your Google Workspaces directory you specify, including removing these groups and users created by AWS Control Tower. There is a PFR #179 Configurable handling of 'manually created' Users/Groups in IAM Identity Center to implement an option to ignore these users and groups, hopefully this will be implemented in version 3.x. However, this has a dependancy on PFR #166 Ensure all groups/user creates in IAM Identity Store are via SCIM api and populate externalId field, to be able to reliably and consistently disinguish between SCIM Provisioned users from Manually Created users

[!WARNING] There are breaking changes for versions >= 0.02

[!WARNING] >= 1.0.0-rc.5 groups to do not get deleted in AWS SSO when deleted in the Google Directory, and groups are synced by their email address

[!WARNING] >= 2.0.0 this makes use of the Identity Store API which means:

[!WARNING] >= 2.1.0 make use of named IAM resources, so if deploying via CICD or IaC template will require CAPABILITY_NAMED_IAM to be specified.

[!IMPORTANT] >= 2.1.0 switched to using provided.al2 powered by ARM64 instances.

[!IMPORTANT] As of v2.2.0 multiple query patterns are supported for both Group and User matching, simply separate each query with a ,. For full sync of groups and/or users specify '*' in the relevant match field. User match and group match can now be used in combination with the sync method of groups. Nested groups will now be flattened into the top level groups. External users are ignored. Group owners are treated as regular group members. User details are now cached to reduce the number of api calls and improve execution times on large directories.

References

Installation

The recommended installation is:

You can also: You can go get github.com/awslabs/ssosync or grab a Release binary from the release page. The binary can be use

View on GitHub
GitHub Stars636
CategoryDevelopment
Updated2d ago
Forks211

Languages

Go

Security Score

95/100

Audited on Apr 2, 2026

No findings