Development Notes
  • Introduction
  • Programming Langauges
    • Java
      • Cache
      • Java Fundamentals
      • Multithreading & Concurrency
      • Spring Boot
        • Spring Security
        • Development tips
      • ORM
        • Mybatis
      • Implementation & Testing
    • Node.js
      • Asynchronous Execution
      • Node.js Notes
    • Python
      • Memo
  • Data Structure & Algorithm
  • Database
  • Design Pattern
  • AWS Notes
    • Services
      • API Gateway
      • CloudHSM
      • Compute & Load Balancing
        • Auto Scaling Group
        • EC2
        • ECS
        • ELB
        • Lambda
      • Data Engineering
        • Athena
        • Batch
        • EMR
        • IoT
        • Kinesis
        • Video Streaming
        • Quicksight
      • Deployment
        • CloudFormation
        • Code Deploy
        • Elastic Beanstalk
        • OpsWorks
        • SAM
        • SSM
      • ElasticSearch
      • Identity & Federation
        • Directory Service
        • IAM
        • Organizations
        • Resource Access Manager (RAM)
        • SSO
        • STS
      • KMS
      • Management Tools
        • Catalog
        • CloudTrail
        • CloudWatch
        • Config
        • Cost Allocation Tags
        • GuardDuty
        • Savings Plans
        • Trusted Advisor
        • X-Ray
      • Migration
        • Cloud Migration: The 6R
        • Disaster Recovery
        • DMS
        • VM Migrations
      • Networking
        • ACM
        • CloudFront
        • Direct Connect
        • EIP & ENI
        • Network Security
        • PrivateLink
        • Route53
        • VPC
        • VPN
      • Service Commnucation
        • Amazon MQ
        • SNS
        • SQS
        • Step Functions
        • SWF
      • Storage
        • Aurora
        • DynamoDB
        • EBS
        • EFS
        • ElastiCache
        • RDS
        • Redshift
        • S3
        • Storage Gateway
      • Other Services
        • Alexa for Business, Lex, Connect
        • AppStream 2.0
        • CloudSearch
        • Comprehend
        • Data Tools
        • Elastic Transcoder
        • Mechanical Turk
        • Rekognition
        • WorkDocs
        • WorkSpaces
    • Well Architect Framework
      • Security
      • Reliability
      • Performance Effeciency
      • Cost Optimization
      • Operational Excellence
    • Labs
      • Webserver Implementation
      • ELB Implementation
      • Auto-scaling Implementation
      • A 3-tier Architecture In VPC
  • Architecture
    • Security
  • Spark
    • Memo
  • Conference Notes
    • Notes of JCConf 2017
  • AI Notes
Powered by GitBook
On this page

Was this helpful?

  1. AWS Notes
  2. Services
  3. Identity & Federation

IAM

PreviousDirectory ServiceNextOrganizations

Last updated 4 years ago

Was this helpful?

Introduction

  • Identity and Access Management (IAM) enableing control access to AWS services and resources

  • Can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources

  • A global (Not Regional) service

Feature

  • Providing

    • Centralized control

    • Shared access to AWS account

    • Granular permissions

    • Identity Federation (ex. to a SAML IdP)

      • Create a SAML provider in IAM and create IAM role that establishes a trust relationship between IAM and the IdP that identifies the IdP as a principal (trust entity) for purposes of federation.

    • Multifactor Authorization (MFA)

    • Providing temporary access for users, devices, services

    • Can set up custom password policy (ex: password rotation)

    • Support PCI DSS compliance

  • Composition

    • Users

      • Simply people

      • Access type:

        • Programmatically accessing AWS APIs and command line

          • Access Key ID

          • Secret Access Key (only visible when creating, can be downloaded in the crendential.csv)

        • AWS console

          • Password (only visible when creating, can be downloaded in the crendential.csv)

    • Groups

      • A collection of people applying the same permissions

    • Roles

      • Can create a role then attach it to AWS resources or users

      • If a user switches the role, original access to the user is canceled. He can only use the access of the role.

      • Service Role (ex. )

    • Policies

      • A JSON document defining permissions

      • Scenarios

        • (The best way is to use AWS Catalog)

          • Can be defined either with IAM policies for a role, user or with AWS Organizations SCP for an OU / entire organization.

          •       "Condition": {
                    "StringEquals": {
                      "aws:RequestTag/key1": "value1",
                      "aws:RequestTag/key2": "value2"
                    },
                    "ForAllValues:StringEquals": {
                      "aws:TagKeys": [
                        "key1",
                        "key2"
                      ]
                    }
                  }
    • Trust Policy

      • A JSON document defining who can assume the role

    • Authenticates the principal.

    • Determines which policy to apply to the request.

    • Evaluates the policy types and arranges an order of evaluation.

    • Processes the policies against the request context to determine if it is allowed.

Related Service

  • Access Advisor - See permissions granted and last access time

  • Access Analyzer - Analyze resources that are shared with external entity

attaching the role (or service role) to EC2 within instance metadata
Service-linked Role
Configure an IAM Policy that restricts access only to the user-specific folders in the Amazon S3 Bucket.
Force tagging to AWS resources
Evaluaiton logics
Determining whether a request is allowed or denied within an account