auditclaw-idpIdentity provider compliance checks for auditclaw-grc. 8 read-only checks across Google Workspace (MFA, admin audit, inactive users, passwords) and Okta (MFA...
Install via ClawdBot CLI:
clawdbot install mailnike/auditclaw-idpGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Calls external URL not in known-safe list
https://www.auditclaw.aiUses known external API (expected, informational)
googleapis.comAudited Apr 17, 2026 · audit v1.0
Generated Mar 21, 2026
A SaaS company undergoing SOC2 Type II audit needs to demonstrate identity provider compliance. This skill automates evidence collection for Google Workspace and Okta, verifying MFA enforcement, password policies, and user activity to meet access control and security monitoring requirements.
A healthcare organization using Google Workspace or Okta must comply with HIPAA security rules. The skill checks for strong password policies, MFA on all accounts, and inactive user management to ensure protected health information (PHI) is accessed only by authorized, active personnel.
A financial institution subject to regulations like GLBA or FFIEC guidelines uses this skill to audit identity providers. It validates session timeouts, password strength, and admin account security to prevent unauthorized access and meet stringent financial compliance standards.
A large enterprise rolling out MFA across Google Workspace or Okta needs to verify enforcement. This skill scans all active users to ensure MFA enrollment, identifying non-compliant accounts for remediation and providing automated evidence of security posture improvement.
An organization seeking ISO 27001 certification uses the skill to gather evidence for identity management controls. It checks password policies, inactive user cleanup, and admin audit trails, automating documentation for Annex A controls related to access management and user accountability.
A consultancy offers ongoing compliance monitoring using this skill to automate evidence collection for clients. They integrate it into audit workflows, charging subscription fees for regular sweeps and reports that demonstrate adherence to SOC2, HIPAA, or ISO standards.
An MSSP bundles this skill into their security offerings to monitor client identity providers. They use it for proactive threat detection, such as identifying weak passwords or inactive accounts, and upsell remediation services based on findings.
Large enterprises adopt the skill internally to streamline audit processes. It reduces manual effort for IT and compliance teams, saving costs on external audits and enabling continuous monitoring, with value derived from operational efficiency and risk reduction.
💬 Integration Tip
Ensure auditclaw-grc is installed first and environment variables are set correctly for each provider; use the test-connection command to verify setup before running full sweeps.
Scored Apr 18, 2026
Use when reviewing code for security vulnerabilities, implementing authentication flows, auditing OWASP Top 10, configuring CORS/CSP headers, handling secrets, input validation, SQL injection prevention, XSS protection, or any security-related code review.
gws CLI: Shared patterns for authentication, global flags, and output formatting.
Set up Gmail API access via gog CLI with manual OAuth flow. Use when setting up Gmail integration, renewing expired OAuth tokens, or troubleshooting Gmail authentication on headless servers.
Automate OAuth login flows with user confirmation via Telegram. Supports 7 providers: Google, Apple, Microsoft, GitHub, Discord, WeChat, QQ. Features: - Auto-detect available OAuth options on login pages - Ask user to choose via Telegram when multiple options exist - Confirm before authorizing - Handle account selection and consent pages automatically
Self-hosted auth for TypeScript/Cloudflare Workers with social auth, 2FA, passkeys, organizations, RBAC, and 15+ plugins. Requires Drizzle ORM or Kysely for D1 (no direct adapter). Self-hosted alternative to Clerk/Auth.js. Use when: self-hosting auth on D1, building OAuth provider, multi-tenant SaaS, or troubleshooting D1 adapter errors, session caching, rate limits, Expo crashes, additionalFields bugs.
OAuth token refresh management for Google APIs via gog CLI.