Understand AWS IAM concepts like Authentication, Authorization, User, Groups, Roles and Policies
What you will learn
Authentication and Authorization
AWS IAM – Concepts
User, Groups, Roles and Policies
IAM Policy evaluation logic
Description
Security is a crucial aspect of any application or any infrastructure you design or build. AWS IAM allows you to securely build and operate in AWS Cloud. AWS IAM interacts with almost every AWS service and authorizes every request you send to AWS cloud. Some of the concepts of AWS IAM are pretty unique (like roles), which may be difficult to understand and comprehend. In this training you will learn these concepts using real life analogies.
Using AWS IAM, you can create users who regularly login to access AWS resources, arrange them in a group for easier management, and let them assume a role (within or across AWS accounts) so that they can perform various aspects of their work in AWS cloud securely using temporary credentials. IAM Roles, also helps AWS services to access other AWS services securely.
For providing required permission to these identities, AWS IAM uses policies, which give you the granular control on the actions performed by these identities.
AWS IAM can also facilities adding external identity providers so your users don’t have to authenticate separately for using AWS Cloud.
Whether you are builder (developer, solution architect) or an operator (Systems Admin, Network Engineer, Security Consultant), AWS IAM helps you leverage AWS Cloud is the safest possible manner.
Content
Introduction
AWS Identity and Access Management (AWS IAM)
Additional Resources