Difference between revisions of "AWS Identity and Access Management (IAM)"
Jump to navigation
Jump to search
↑ https://en.wikiversity.org/wiki/Cloud_computing/Amazon_Web_Services/Identity_and_Access_Management
↑ https://aws.amazon.com/blogs/aws/new-managed-policies-for-aws-identity-access-management/
↑ https://aws.amazon.com/blogs/security/how-to-assign-permissions-using-new-aws-managed-policies-for-job-functions/
↑ https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_job-functions.html
↑ https://aws.amazon.com/es/blogs/security/easier-way-to-control-access-to-aws-regions-using-iam-policies/
Line 17: | Line 17: | ||
== Activities == | == Activities == | ||
* Read https://stackoverflow.com/questions/tagged/amazon-iam?tab=Votes | * Read https://stackoverflow.com/questions/tagged/amazon-iam?tab=Votes | ||
+ | * [[Granting access to your billing information and tools]] | ||
== See also == | == See also == |
Revision as of 11:08, 18 November 2022
Amazon in 2012 introduces AWS Identity and Access Management (IAM) for EC2 [1]. In February introduced Managed Policies by AWS[2] and since November 2016 there are 10 different policies bases on job functions: AdministratorAccess
(This policy grants full access to all AWS services, similar to root role in Unix systems), Billing
, Data Scientist
, Database Administrator
, Developer Power User
, Network Administrator
, Security Auditor
, Support User
, System Administrator and View Only User
[3][4]
Examples policies
aws:RequestedRegion
(April 2018) [5]iam:ChangePassword
arn:aws:iam::aws:policy/ReadOnlyAccess
Related terms
- SigV4
- AWS IAM Access Analyzer (Dec 2019)
- Azure Identity and access management (IAM)
gcloud iam
aws-iam-authenticator
and EKS- AWS IAM role
Activities
- Read https://stackoverflow.com/questions/tagged/amazon-iam?tab=Votes
- Granting access to your billing information and tools
See also
aws iam
[create-user
,create-group, get-user
,list-users
|list-policies
|list-attached-user-policies
|attach-user-policy
|list-attached-user-policies
|list-roles
|get-account-summary
|put-group-policy | put-role-policy | put-user-policy
|create-login-profile
|aws iam delete-virtual-mfa-device
|aws iam list-virtual-mfa-devices
|aws iam create-saml-provider
|aws iam list-account-aliases
|aws iam create-role | aws iam change-password| enable-mfa-device | list-instance-profiles
- IAM: AWS IAM Identity Center, AWS Identity and Access Management, Google Cloud IAM, Azure IAM, SailPoint, CyberArk, CIAM, ForgeRock,
iam:ChangePassword
,aws iam
,AdministratorAccess
, Context keys, IAM Access Analyzer, AWS policy, AWS managed policies,IAMUserChangePassword
, AWS Roles, List of AWS policies, Resource-based policy,aws-iam-authenticator
, IRSA, RDS Authentication,AccessDenied
, AWS Authentication, AWS IAM external access analyzer - Single sign-on: Okta, Red Hat Single Sign-On, Keycloak, SAML, ADFS, Access Management Magic Quadrant, Oracle Access Manager, AWS SSO, Azure Active Directory, Federated authentication, Google Workspace: set up SSO via SAML for Amazon Web Services, Login with, Microsoft account, Shibboleth
Advertising: