Загрузка страницы

AWS Security - IAM- Users, Groups, Policy, Roles, CLI - Identity & Access Management

What is IAM users, group, policies and IAM roles

For more interesting updates Please subscribe My Channel
https://www.youtube.com/channel/UCcMYfeBG8xUW8R3yC7pDhfA

To Ask Questions Email: kadian2010@gmail.com

For Classes, AWS Tranings, Class Notes WhatsApp me on: 8700059006

Visit the Main YouTube Channel at: https://www.youtube.com/channel/UCcMYfeBG8xUW8R3yC7pDhfA

Follow us on Linkdin at: https://www.linkedin.com/in/ashok-kadian-a953a849/

Follow us on Facebook group: https://www.facebook.com/groups/1905672133014340/

Follow us on Facebook page: https://www.facebook.com/Techhearts-Technology-Pvt-Ltd-1999050993658773/

??Watch More...
What is AWS?
-IaaS -Compute
-Storage
-Networking
-Database
-DNS
-Global Data Centers AWS vs. Linode/ Digital Ocean
-IaaS vs. VPS Benefits of AWS
-Highly Scalable
-TCO is Generally Lower Than Private Infrastructure
-Highly Reliable for Price Point -Centralized Billing and Management Problems with AWS -Lock In -Learning Curve
-Building Correct Infrastructure -Cost Adds Up… Pricing of AWS
-Compute Pricing -Storage Pricing -Bandwidth Pricing -Interaction Pricing Migrating to AWS
-Can Be As Simple As A Normal Migration
-For Full Benefits You May Need To Reimagine/ Rebuild Entire Architecture Certification / Education
-aws.amazon.com/certification/
General

Q: What is AWS Identity and Access Management (IAM)?
You can use AWS IAM to securely control individual and group access to your AWS resources. You can create and manage user identities ("IAM users") and grant permissions for those IAM users to access your resources. You can also grant permissions for users outside of AWS (federated users).

Q: How do I get started with IAM?
After you’ve signed up for AWS, you can create users and groups and assign them permissions to access your AWS resources. You can use the IAM console (for web-based access), the AWS Command Line Interface (CLI, for command line access), or the API or SDKs (for programmatic access). To grant permissions, you create policy documents that you attach to users, groups, or other entities. See the video, Getting Started with AWS IAM.

Q: What problems does IAM solve?
IAM makes it easy to provide multiple users secure access to your AWS resources. IAM enables you to:

Manage IAM users and their access: You can create users in AWS's identity management system, assign users individual security credentials (such as access keys, passwords, multi-factor authentication devices), or request temporary security credentials to provide users access to AWS services and resources. You can specify permissions to control which operations a user can perform.
Manage access for federated users: You can request security credentials with configurable expirations for users who you manage in your corporate directory, allowing you to provide your employees and applications secure access to resources in your AWS account without creating an IAM user account for them. You specify the permissions for these security credentials to control which operations a user can perform.

Q: Who can use IAM?
Any AWS customer can use IAM. The service is offered at no additional charge. You will be charged only for the use of other AWS services by your users.

Q: What is a user?
A user is a unique identity recognized by AWS services and applications. Similar to a login user in an operating system like Windows or UNIX, a user has a unique name and can identify itself using familiar security credentials such as a password or access key. A user can be an individual, system, or application requiring access to AWS services. IAM supports users (referred to as "IAM users") managed in AWS's identity management system, and it also enables you to grant access to AWS resources for users managed outside of AWS in your corporate directory (referred to as "federated users").

Q: What can a user do?
A user can place requests to web services such as Amazon S3 and Amazon EC2. A user's ability to access web service APIs is under the control and responsibility of the AWS account under which it is defined. You can permit a user to access any or all of the AWS services that have been integrated with IAM and to which the AWS account has subscribed. If permitted, a user has access to all of the resources under the AWS account. In addition, if the AWS account has access to resources from a different AWS account, its users may be able to access data under those AWS accounts. Any AWS resources created by a user are under control of and paid for by its AWS account. A user cannot independently subscribe to AWS services or control resources.

Q: How do users call AWS services?
Users can make requests to AWS services using security credentials. Explicit permissions govern a user's ability to call AWS services. By default, users have no ability to call service APIs on behalf of the account.

Видео AWS Security - IAM- Users, Groups, Policy, Roles, CLI - Identity & Access Management канала techhearts
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
26 октября 2017 г. 23:17:28
01:12:55
Яндекс.Метрика