Made with love in Paris 🇫🇷
Open-SSPM is a small “who has access to what” service. It syncs identities from Okta and Microsoft Entra ID (IdP sources), permissions from connected apps (Google Workspace, GitHub, Datadog, AWS Identity Center), links accounts (auto by email + manual links), and renders a server-side UI.
- URL:
https://demo.opensspm.com - Login:
[email protected]/admin
- HTTP server (
open-sspm serve) + background full sync worker (open-sspm worker) + background discovery worker (open-sspm worker-discovery) + one-off syncs (open-sspm sync,open-sspm sync-discovery) + in-app “Resync” (queued async by default). - Okta: users, groups, apps, and assignments (IdP source).
- Microsoft Entra ID: users plus application/service principal governance metadata.
- Google Workspace: users, groups, admin roles, OAuth app/grant inventory, and token audit activity.
- SaaS Discovery: discovered app inventory + hotspots from IdP SSO and OAuth grant evidence (Okta System Log + Entra sign-ins/grants), with governance and binding workflows.
- GitHub: org members/teams/repo permissions (optional SCIM lookup for emails).
- Datadog: users + role assignments.
- AWS Identity Center: users + account/permission set assignments.
- Programmatic access governance: browse app assets and credentials with risk labels, expiry filters, and actor attribution links.
- Matching: automatic by email (case-insensitive) + manual linking for accounts without email.
- Findings: Okta CIS benchmark rule evaluations (rules must be seeded; see below).
- Server-rendered UI: Echo + templ; Tailwind v4 with custom component library; minimal vanilla JS for UX.
- Go 1.26.x (go.mod uses toolchain
go1.26.0) - Docker + Docker Compose
- Node.js + npm (for building CSS)
- Optional:
air(live reload),templ(template generation),sqlc(regen DB code)
- Copy
.env.exampleto.envand update as needed. - Start Postgres:
just dev-up - Run migrations:
just migrate - Install JS deps + build CSS:
npm install && just ui - Run the server:
just run - Run background workers:
just worker(full lane) andgo run ./cmd/open-sspm worker-discovery(discovery lane). - Generate a stable connector secret key and export it before configuring connectors:
export CONNECTOR_SECRET_KEY="$(openssl rand -base64 32)"
- Open
http://localhost:8080, configure connectors under Settings → Connectors, then run a sync (Settings → Resync queues workers by default, or usejust syncfor one-off inline execution). - Optional: enable SaaS discovery on Okta/Entra connector settings, run sync, then review
http://localhost:8080/discovery/appsandhttp://localhost:8080/discovery/hotspots.
Rulesets are loaded from generated Open SSPM spec Go entities (github.com/open-sspm/open-sspm-spec/gen/go/opensspm/spec/v2) and must be seeded into Postgres before they show up in the UI:
go run ./cmd/open-sspm seed-rules
After seeding, run an Okta sync and open http://localhost:8080/findings/rulesets/cis.okta.idaas_stig.v2.
- Live-reload server:
just dev(requiresair+templ) - Run background full sync worker:
just worker - Run background discovery sync worker:
go run ./cmd/open-sspm worker-discovery - Watch CSS:
just ui-watch - Sync vendored runtime JS:
npm run vendor:sync(also runs automatically afternpm install/npm ci) - Check vendored runtime JS drift:
npm run vendor:check - Run frontend JS unit tests:
just ui-test(ornpm run test:js) - Regenerate templ templates:
just templ(watch:just templ-watch) - Regenerate SQLC code:
just sqlc(generated code is checked in underinternal/db/gen)
- Process-level env vars:
.env.example(database, HTTP address, sync interval/workers). - Structured logging for service/ops commands:
LOG_FORMAT=json|text(default:json)LOG_LEVEL=debug|info|warn|error(default:info)- Invalid logging values fail fast at startup.
- Discovery lane:
SYNC_DISCOVERY_ENABLED=1(default) enables the separate SaaS discovery lane; set0to disable discovery workers and discovery resyncs system-wide. - Manual resync mode:
RESYNC_MODE=signal(default, creates a durable sync job for background workers) orRESYNC_MODE=inline(request runs sync directly). - Connector credentials: configured in-app under Settings → Connectors. Public connector metadata stays in Postgres, and secret values are stored separately in encrypted form using
CONNECTOR_SECRET_KEY/CONNECTOR_SECRET_KEY_FILE. - AWS Identity Center uses the AWS SDK default credentials chain (env/shared config/role), not DB-stored keys.
- SaaS discovery is per-connector (
discovery_enabled) for Okta, Entra, and Google Workspace.- Okta discovery uses System Log access.
- Entra discovery uses sign-in and OAuth grant APIs (
AuditLog.Read.All,Directory.Read.All,DelegatedPermissionGrant.Read.All). - Google Workspace discovery uses Reports API login/token activity and token inventory.
- Source identity:
customer_idis the canonicalsource_name(source_kind=google_workspace);primary_domainis display metadata only. - Required Google Admin delegated scopes:
https://www.googleapis.com/auth/admin.directory.user.readonlyhttps://www.googleapis.com/auth/admin.directory.group.readonlyhttps://www.googleapis.com/auth/admin.directory.group.member.readonlyhttps://www.googleapis.com/auth/admin.directory.rolemanagement.readonlyhttps://www.googleapis.com/auth/admin.directory.user.securityhttps://www.googleapis.com/auth/admin.reports.audit.readonly
- Domain-Wide Delegation prerequisites:
- Create or choose a service account and enable Domain-Wide Delegation for it.
- In Admin Console, authorize the service account client ID with the scopes above.
- Set
delegated_admin_emailto a super admin (or delegated admin with equivalent read privileges).
- Auth mode options:
service_account_json: provide full JSON key in connector settings.adc: run Open-SSPM with ADC/workload identity that can call IAM CredentialssignJwtonservice_account_email.
- Metrics are served on a dedicated listener (
METRICS_ADDR) and are best-effort. - Metrics collection failures after successful syncs are tracked in
opensspm_sync_metrics_collection_failures_total. - Discovery metrics include:
opensspm_discovery_events_ingested_totalopensspm_discovery_ingest_failures_totalopensspm_discovery_apps_totalopensspm_discovery_hotspots_total
- Open-SSPM includes in-app authentication (email/password) using server-side sessions stored in Postgres.
- Avoid logging connector secrets.
- Set a stable base64-encoded 32-byte
CONNECTOR_SECRET_KEY(orCONNECTOR_SECRET_KEY_FILE) anywhere you runserve,worker, or sync commands. Losing that key means stored connector secrets must be re-entered.
See CONTRIBUTING.md.