Inspiration
Manual AWS permission management is a bottleneck that plagues organizations everywhere. IT teams spend hours provisioning access, users wait days for permissions, and security teams lose sleep over orphaned accounts. We were inspired by the idea that identity management should be invisible to users - when they join a team in Okta, they should instantly have the right AWS access without anyone lifting a finger.
What it does
Zero-Touch Entitlements automatically syncs Okta group changes to AWS Identity Center in real-time. When a user is added to a group in Okta, our system instantly provisions the corresponding permission sets in AWS. When they're removed, access is immediately revoked. It eliminates manual provisioning entirely while maintaining strict security controls and audit trails.
How we built it
We built an event-driven architecture using AWS native services. CloudTrail captures Okta API events, EventBridge routes them to Lambda functions that parse the events and use Boto3 to manage AWS Identity Center permission sets. The system leverages SCIM provisioning to establish Okta as the authoritative identity source, creating a seamless bridge between identity management and cloud access control.
Challenges we ran into
The biggest challenge was handling AWS's complex permission model - understanding how Permission Sets, Groups, and Accounts interact to create effective user permissions. We also had to ensure event processing was idempotent and handle edge cases like rapid group membership changes. Debugging Lambda functions in the event flow required careful logging and monitoring setup.
Accomplishments that we're proud of
We achieved true zero-touch provisioning - from identity change to AWS access in under 30 seconds with zero human intervention. The system is completely automated yet maintains full audit trails and security compliance. We successfully abstracted away AWS's complexity while preserving its powerful permission model.
What we learned
Event-driven IAM is the future of identity management. We learned that the key isn't just automation, but intelligent automation that understands the business context of identity changes. We also discovered the importance of building systems that are observable - when permissions are automated, visibility becomes critical.
What's next for Zero-Touch Entitlements: SCIM for Dynamic AWS Access
We would like to expand beyond basic group sync to include time-based access, approval workflows for sensitive permissions, and cross-cloud support for Azure and GCP. We also plan to add AI-powered access recommendations based on user behavior patterns and automated compliance reporting that maps identity changes to business processes.
Log in or sign up for Devpost to join the conversation.