Editing AWS Identity and Access Management (IAM)

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
Amazon in 2012 introduces AWS Identity and Access Management ([[IAM]]) for EC2 <ref>https://en.wikiversity.org/wiki/Cloud_computing/Amazon_Web_Services/Identity_and_Access_Management</ref>. In February introduced Managed [[Policies]] by AWS<ref>https://aws.amazon.com/blogs/aws/new-managed-policies-for-aws-identity-access-management/</ref> and since November 2016 there are 10 different policies bases on job functions: <code>[[AdministratorAccess]]</code> (This policy grants full access to all AWS services, similar to root role in Unix systems), <code>Billing</code>,<code> Data Scientist</code>, <code>Database Administrator</code>, <code>Developer Power User</code>, <code>Network Administrator</code>, <code>Security Auditor</code>, <code>Support User</code>, <code>System Administrator and View Only User</code> <ref>https://aws.amazon.com/blogs/security/how-to-assign-permissions-using-new-aws-managed-policies-for-job-functions/</ref><ref>https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_job-functions.html</ref>
+
Amazon in 2012 introduces AWS Identity and Access Management (IAM) for EC2 <ref>https://en.wikiversity.org/wiki/Cloud_computing/Amazon_Web_Services/Identity_and_Access_Management</ref>. In February introduced Managed Policies by AWS<ref>https://aws.amazon.com/blogs/aws/new-managed-policies-for-aws-identity-access-management/</ref> and since November 2016 there are 10 different policies bases on job functions: AdministratorAccess (This policy grants full access to all AWS services, similar to root role in Unix systems), Billing, Data Scientist, Database Administrator, Developer Power User, Network Administrator, Security Auditor, Support User, System Administrator and View Only User <ref>https://aws.amazon.com/blogs/security/how-to-assign-permissions-using-new-aws-managed-policies-for-job-functions/</ref><ref>https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_job-functions.html</ref>
  
  
== Examples policies ==
 
* <code>[[aws:RequestedRegion]]</code> (April 2018) <ref>https://aws.amazon.com/es/blogs/security/easier-way-to-control-access-to-aws-regions-using-iam-policies/</ref>
 
* <code>[[iam:ChangePassword]]</code>
 
* <code>arn:aws:iam::aws:policy/[[ReadOnlyAccess]]</code>
 
  
== News ==
+
== See also ==
* [[AWS timeline|Nov 2022]] assign multiple [[MFA]] devices in IAM https://aws.amazon.com/blogs/security/you-can-now-assign-multiple-mfa-devices-in-iam/
+
* {{SSO}}
* Dec 2019 [[AWS IAM Access Analyzer]]
+
* {{IAM}}
* Feb 2015 [[AWS Security Token Service (STS)]] in Every AWS Region
+
* {{AWS}}
* Oct 2013 [[AWS IAM policy simulator]]
 
 
 
== Activities ==
 
* Read https://stackoverflow.com/questions/tagged/amazon-iam?tab=Votes
 
* [[Granting access to your billing information and tools]]
 
* [[Using temporary credentials with AWS resources]]: <code>[[aws sts get-session-token]]</code>
 
 
 
== Related terms ==
 
* [[SigV4]]
 
* [[Azure Identity and access management (IAM)]]
 
* <code>[[gcloud iam]]</code>
 
* <code>[[aws-iam-authenticator]]</code> and [[EKS]]
 
* [[AWS IAM role]]
 
  
== See also ==
 
* {{AWS IAM}}
 
  
[[Category:IAM]]
+
[[Category:Computing]]
 +
[[Category:Internet]]
 
[[Category:AWS]]
 
[[Category:AWS]]

Please note that all contributions to wikieduonline may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Wikieduonline:Copyrights for details). Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)

Template used on this page:

Advertising: