Difference between revisions of "Identity & Access Management (IAM)"
Jump to navigation
Jump to search
↑ https://aws.amazon.com/es/blogs/security/easier-way-to-control-access-to-aws-regions-using-iam-policies/
Line 8: | Line 8: | ||
* <code>[[aws:RequestedRegion]]</code> (April 2018) <ref>https://aws.amazon.com/es/blogs/security/easier-way-to-control-access-to-aws-regions-using-iam-policies/</ref> | * <code>[[aws:RequestedRegion]]</code> (April 2018) <ref>https://aws.amazon.com/es/blogs/security/easier-way-to-control-access-to-aws-regions-using-iam-policies/</ref> | ||
− | * <code>[iam:ChangePassword]]</code> | + | * <code>[[iam:ChangePassword]]</code> |
Revision as of 11:10, 8 August 2021
- AWS Identity and Access Management
- Cloud IAM (GCP)
- Single sign-on: Keycloak
- SailPoint
- CyberArk
- IAM Access Analyzer
aws:RequestedRegion
(April 2018) [1]iam:ChangePassword
Related terms
- Acceptto, Perimeter 81 and TokenEx
- Deepnet Security
- OpenStack Identity - Keystone
- Access Management (AM) Magic Quadrant
- Certified Identity and Access Manager (CIAM)
Activities
- Read Security best practices in IAM https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
See also
- IAM: AWS IAM Identity Center, AWS Identity and Access Management, Google Cloud IAM, Azure IAM, SailPoint, CyberArk, CIAM, ForgeRock,
iam:ChangePassword
,aws iam
,AdministratorAccess
, Context keys, IAM Access Analyzer, AWS policy, AWS managed policies,IAMUserChangePassword
, AWS Roles, List of AWS policies, Resource-based policy,aws-iam-authenticator
, IRSA, RDS Authentication,AccessDenied
, AWS Authentication, AWS IAM external access analyzer - Single sign-on: Okta, Red Hat Single Sign-On, Keycloak, SAML, ADFS, Access Management Magic Quadrant, Oracle Access Manager, AWS SSO, Azure Active Directory, Federated authentication, Google Workspace: set up SSO via SAML for Amazon Web Services, Login with, Microsoft account, Shibboleth
Advertising: