Check provider logo

IAM SAML provider exists in the account

iam_check_saml_providers_sts

Severitylow
Serviceiam
by Prowler

IAM SAML providers enable federated role assumption via STS AssumeRoleWithSAML.

This evaluates whether such providers exist in the account.

Risk

Without SAML federation, users rely on long-lived IAM keys. Compromised keys enable persistent API access, causing data exfiltration (C), unauthorized resource or policy changes (I), and difficult revocation. Lack of IdP controls (e.g., MFA, session limits) weakens accountability and access governance.

Run this check with Prowler CLI

prowler aws --checks iam_check_saml_providers_sts

Recommendation

Adopt SAML federation to issue short-lived STS credentials. Map users to roles with least privilege, enforce MFA at the IdP, and set conservative session durations. Retire IAM user access keys for interactive use and monitor role sessions as defense in depth. If federation isn't possible, tightly scope, rotate, and audit keys.

Remediation

CLI

aws iam create-saml-provider --name <SAML_PROVIDER_NAME> --saml-metadata-document file://<SAML_METADATA_XML_FILE>

Native IaC
Terraform
Other
  1. In the AWS console, go to IAM
  2. In the left menu, select Identity providers
  3. Click Add provider
  4. Set Provider type to SAML
  5. Upload the SAML metadata XML and enter a Provider name
  6. Click Add provider

Source Code

Resource Type

Other

References