• AWS Resource Explorer - a lighter-weight version of the AWS console where everything is just a sortable/filterable/searchable table.
• Access Denied Debugger - paste an "AccessDenied" message and get back a stack-trace style UI showing all the resources involved, reason for the error (e.g., which policy is missing a permission), recent changes via CloudTrail, etc.
• AWS Organizations / SCP Viewer - generates a tree-diagram style UI showing all your AWS accounts, which policies apply to them, etc.
Still working on merging these into a cohesive application (mostly just been scratching my own itches so far). I'm trying to consider privacy/security carefully, so everything is client-side, using the AWS JavaScript SDK, and creds/data are only stored locally.
This is awesome, I work at AWS and might use this when the console load times get on my last nerve and I just want to check some IAM policies. The Access Denied debugger sounds like a massive timesaver too.
Oh that’s so nice to hear! It’s quite an early alpha, but I’ve working to expand support for more resource types and details. Feedback is very welcomed.
Right now it's a collection of a few tools:
• AWS Resource Explorer - a lighter-weight version of the AWS console where everything is just a sortable/filterable/searchable table.
• Access Denied Debugger - paste an "AccessDenied" message and get back a stack-trace style UI showing all the resources involved, reason for the error (e.g., which policy is missing a permission), recent changes via CloudTrail, etc.
• AWS Organizations / SCP Viewer - generates a tree-diagram style UI showing all your AWS accounts, which policies apply to them, etc.
Still working on merging these into a cohesive application (mostly just been scratching my own itches so far). I'm trying to consider privacy/security carefully, so everything is client-side, using the AWS JavaScript SDK, and creds/data are only stored locally.