Pricing
Free
1,000
Role Assumptions per monthUnlimited Users
Unlimited AWS Accounts
Assume via Web
Assume via CLI
Roles for Repositories
Assume in GitHub Actions
Access Control as Code
Weekly Email Reports
Premium
$5 per active user
per month+ Everything in Free Tier
Unlimited Role Assumptions
GitHub Teams
Access Requests/Grants
Audit Logs
Usage Reports
2-Factor Authentication
Email Notifications
Webhooks
API Access
BYO Certificate
Enterprise
Contact Us for Pricing
+ Everything in Premium Tier
Dedicated SSO Tenant
Self-Hosted or SaaS
Custom PKI Support
Additional Identity Providers
Premium Features
GitHub Teams
SAML.to can synchronize with GitHub Teams. Teams granted to roles in
saml-to.yml
will
automatically be granted access. This simplifies onboarding and offboarding of users to just GitHub and
eliminates needs to edit saml-to.yml
when membership changes.
Access Grants/Approvals
GitHub users can request temporary access to sensitive roles. Administrators can grant approval using Email or
Slack.
Audit Logs
Get access to Audit Logs for your organization, accounts, users. Learn and audit which users or repositories
assumed what role and when they did it, and how often.
Usage Reports
Log in to an Administrative Portal to visualize what roles are being assumed by which users or repositories
and how often.
2-Factor Authentication
Prevent GitHub Tokens stored on systems from becoming too old. Set up occasional 2nd Factor Authentication
(TOTP or SMS) to ensure the User is who they say they are.
Email Notifications
Send messages to users when they are granted a new role. Inform users when their Access has been revoked.
Inform Adminstrators when a particulary sensitive role has been assumed.
Webhooks
Receive Webhooks from SAML.to for advanced customization so your services can know when various things change,
such as membership, configuration, role assumption, access requests, and so on.
API Access
Generate an API token for advanced customization of the SAML.to workflows for your own custom instrumentation.
BYO (Bring-Your-Own) Certificate
Store your own Private Key and Certificate in
saml-to.yml
or GitHub Repository Secrets for SAML
Assertions, instead of SAML.to storing it for you.