AWS Integration
Secure privileged access to your AWS infrastructure with unified identity, just-in-time access, and comprehensive audit trails.
Comprehensive AWS Coverage
Secure access to all your AWS services with unified authentication and authorization.
IAM Integration
Seamlessly integrate with AWS IAM for federated authentication and role assumption.
EC2 Access
SSH access to EC2 instances with automatic discovery and certificate-based authentication.
RDS Protection
Secure database access to RDS instances with protocol-aware proxying and credential rotation.
Secrets Manager
Integration with AWS Secrets Manager for centralized credential management and rotation.
Enterprise-Grade AWS Integration
Get Started in Minutes
Follow these simple steps to integrate TigerAccess with your AWS infrastructure.
Configure IAM Role
Create an IAM role in your AWS account with permissions for TigerAccess to discover and manage access to resources.
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": [
"ec2:Describe*",
"rds:Describe*",
"eks:Describe*"
],
"Resource": "*"
}]
}Add Integration
Configure the AWS integration in TigerAccess with your account ID and IAM role ARN.
tacctl integrations add aws \
--account-id=123456789012 \
--role-arn=arn:aws:iam::123456789012:role/TigerAccessRole \
--regions=us-east-1,us-west-2Verify Discovery
Verify that TigerAccess has discovered your AWS resources and they are available for access.
tac ls
# Shows all discovered AWS resources:
# - EC2 instances
# - RDS databases
# - EKS clustersReal-World AWS Scenarios
Developer Access to Production
Grant developers just-in-time access to production EC2 instances and RDS databases with automatic approval workflows and session recording.
Multi-Account Management
Manage access across multiple AWS accounts and organizations with centralized authentication and unified audit trails.
Compliance Automation
Automatically collect and store audit logs in S3 for compliance requirements like SOC 2, HIPAA, and PCI DSS.
Break-Glass Access
Provide emergency access to critical AWS resources with comprehensive audit trails and automatic session recording.
Frequently Asked Questions
Does TigerAccess require agent installation on EC2 instances?
No. TigerAccess uses certificate-based SSH authentication and does not require agents on EC2 instances. For enhanced features like session recording, you can optionally deploy the TigerAccess agent.
How does TigerAccess integrate with AWS IAM?
TigerAccess can assume IAM roles to provide federated access. Users authenticate to TigerAccess using your identity provider (Okta, Azure AD, etc.), and TigerAccess issues short-lived AWS credentials by assuming the appropriate IAM role.
Can I use TigerAccess across multiple AWS accounts?
Yes. TigerAccess supports AWS Organizations and can manage access across multiple accounts. Configure cross-account IAM roles to enable discovery and access management across your entire AWS organization.
Where are session recordings stored?
Session recordings can be stored in your own S3 bucket with encryption at rest. TigerAccess supports server-side encryption with AWS KMS for additional security.
Ready to Secure Your Infrastructure?
Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.
No credit card required • 14-day free trial • Enterprise support available