Bridging the Gap: Automating Group Assignments in AWS IAM Identity Center with SSO Elevator
READ BLOG POST
BLOGS
Bridging the Gap: Automating Group Assignments in AWS IAM Identity Center with SSO Elevator
Google Workspace SCIM provisioning to AWS IAM Identity Center does not sync groups - a frustrating limitation. SSO Elevator now offers a Terraform-native solution that automatically assigns users to groups based on their attributes, eliminating the need for external tools like ssosync.
MVP: PostgreSQL on AWS in 10 Minutes
A lot of MVP teams pick PostgreSQL because it’s familiar, powerful, and boring in the best way. Then they open the AWS console, click through defaults, and accidentally create a database that’s hard to secure, annoying to operate, and painful to make audit-friendly later. In our work …
FivexL Newsletter, November 2025
November was a busy month for us. We published two blog posts, our co-founder Andrey Devyatkin recorded a new podcast episode, and we pulled together a list of articles our teammates shared internally in Slack. December is already moving fast, and Christmas is just around the corner. Before everyone …
How to Build an MVP on AWS (Part 1): Account Setup, Security & Cost Control
This Part-1 guide is for founders and small product teams shipping their first release on AWS without a full-time DevOps crew. In ~10 minutes you’ll set a rock-solid foundation that stops the classic MVP disasters—surprise bills, insecure accounts, and zero audit trail. We walk you through: …
Building Resilience into SSO Elevator 3.1.0: Lessons from an AWS Outage
How a real AWS outage revealed hidden dependencies in SSO Elevator and led to version 3.1.0 with improved resilience through intelligent S3 caching. A practical guide to engineering for failure.
Unexpectedly Hard: Overcoming Pitfalls in aws_acm_certificate setup
Encountering the “Invalid for_each argument” and “UnsupportedCertificate” errors when configuring AWS ACM certificates via Terraform is surprisingly common. By removing dynamic for_each logic based on unknown attributes and using the aws_acm_certificate_validation resource to wait for certificate …