Difference between revisions of "AWS Solutions Architect/training/Section 3: Identity Management and Permissions"

From Freephile Wiki
Jump to navigation Jump to search
(Created page with "17. Introduction 18. How IAM Works 19. Overview of Users, Groups, Roles and Policies 20. IAM Authentication Methods 21. AWS Security Token Service (STS) 22. Multi-Factor Authe...")
 
Line 1: Line 1:
 
17. Introduction
 
17. Introduction
 +
 
18. How IAM Works
 
18. How IAM Works
 +
 
19. Overview of Users, Groups, Roles and Policies
 
19. Overview of Users, Groups, Roles and Policies
 +
 
20. IAM Authentication Methods
 
20. IAM Authentication Methods
 +
 
21. AWS Security Token Service (STS)
 
21. AWS Security Token Service (STS)
 +
 
22. Multi-Factor Authentication (MFA)
 
22. Multi-Factor Authentication (MFA)
 +
 
23. [HOL] Setup Multi-Factor Authentication (MFA)
 
23. [HOL] Setup Multi-Factor Authentication (MFA)
 +
 
24. Identity-Based Policies and Resource-Based Policies
 
24. Identity-Based Policies and Resource-Based Policies
 +
 
25. Access Control Methods - RBAC & ABAC
 
25. Access Control Methods - RBAC & ABAC
 +
 
26. Permissions Boundaries
 
26. Permissions Boundaries
 +
 
27. IAM Policy Evaluation
 
27. IAM Policy Evaluation
 +
 
28. IAM Policy Structure
 
28. IAM Policy Structure
 +
 
29. [HOL] Using Role-Based Access Control (RBAC)
 
29. [HOL] Using Role-Based Access Control (RBAC)
 +
 
30. [HOL] Using Attribute-Based Access Control (ABAC)
 
30. [HOL] Using Attribute-Based Access Control (ABAC)
 +
 
31. [HOL] Apply Permissions Boundary
 
31. [HOL] Apply Permissions Boundary
 +
 
32. Use Cases for IAM Roles
 
32. Use Cases for IAM Roles
 +
 
33. [HOL] Cross-Account Access to S3
 
33. [HOL] Cross-Account Access to S3
 +
 
34. Access Keys and IAM Roles with EC2
 
34. Access Keys and IAM Roles with EC2
 +
 
35. [HOL] Amazon EC2 Instance Profile
 
35. [HOL] Amazon EC2 Instance Profile
 +
 
36. AWS IAM Best Practices
 
36. AWS IAM Best Practices
 
 
[[Category:AWS]]
 
[[Category:AWS]]

Revision as of 18:09, 7 February 2024

17. Introduction

18. How IAM Works

19. Overview of Users, Groups, Roles and Policies

20. IAM Authentication Methods

21. AWS Security Token Service (STS)

22. Multi-Factor Authentication (MFA)

23. [HOL] Setup Multi-Factor Authentication (MFA)

24. Identity-Based Policies and Resource-Based Policies

25. Access Control Methods - RBAC & ABAC

26. Permissions Boundaries

27. IAM Policy Evaluation

28. IAM Policy Structure

29. [HOL] Using Role-Based Access Control (RBAC)

30. [HOL] Using Attribute-Based Access Control (ABAC)

31. [HOL] Apply Permissions Boundary

32. Use Cases for IAM Roles

33. [HOL] Cross-Account Access to S3

34. Access Keys and IAM Roles with EC2

35. [HOL] Amazon EC2 Instance Profile

36. AWS IAM Best Practices