Difference between revisions of "AWS Identity and Access Management"

From wikieduonline
Jump to navigation Jump to search
Line 17: Line 17:
 
* Feb 2015 [[AWS Security Token Service (STS)]]
 
* Feb 2015 [[AWS Security Token Service (STS)]]
 
* Oct 2013 [[AWS IAM policy simulator]]
 
* Oct 2013 [[AWS IAM policy simulator]]
 +
 +
== Related terms ==
 +
* [[SigV4]]
 +
* [[Azure Identity and access management (IAM)]]
 +
* <code>[[gcloud iam]]</code>
 +
* <code>[[aws-iam-authenticator]]</code> and [[EKS]]
 +
* [[AWS IAM role]]
  
 
== See also ==
 
== See also ==

Revision as of 15:03, 9 January 2024

Amazon in 2012 introduces AWS Identity and Access Management (IAM) for EC2 [1]. In February introduced Managed Policies by AWS[2] and since November 2016 there are 10 different policies bases on job functions: AdministratorAccess (This policy grants full access to all AWS services, similar to root role in Unix systems), Billing, Data Scientist, Database Administrator, Developer Power User, Network Administrator, Security Auditor, Support User, System Administrator and View Only User [3][4]


Examples policies

Activities

News

Related terms

See also

  • https://en.wikiversity.org/wiki/Cloud_computing/Amazon_Web_Services/Identity_and_Access_Management
  • https://aws.amazon.com/blogs/aws/new-managed-policies-for-aws-identity-access-management/
  • https://aws.amazon.com/blogs/security/how-to-assign-permissions-using-new-aws-managed-policies-for-job-functions/
  • https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_job-functions.html
  • https://aws.amazon.com/es/blogs/security/easier-way-to-control-access-to-aws-regions-using-iam-policies/
  • Advertising: