Mais conteúdo relacionado Semelhante a AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos | Edureka (20) AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos | Edureka2. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
Components
of IAM
Agenda
What is IAM?
Multi Factor
Authentication
Hands-on
Why do we need
Access
Management?
3. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
Why Do We Need Access Management?
4. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
Why Do We Need Access Management?
Server
5. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
Why Do We Need Access Management?
Server
Admin
Will be granted all the permissions
6. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
Why Do We Need Access Management?
Server
Admin
Only Graphics Module will be assigned to
UI Dev
Will be granted all the permissions
UI Developer
7. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
Why Do We Need Access Management?
Server
Admin Business Analyst
UI Developer
Only Analytics Module will be assigned to
this role.
Only Graphics Module will be assigned to
UI Dev
Will be granted all the permissions
8. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
What is IAM?
9. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
What is IAM?
AWS Identity and Access Management (IAM) is a web service that helps you securely control
access to AWS resources for your users. You use IAM to control who can use your AWS resources
(authentication) and what resources they can use and in what ways (authorization).
AWS IAM
10. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
Components of IAM
11. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
Components of IAM
Users
Groups
Roles
Policies
Using IAM, you can create and manage AWS users, and use
permissions to allow and deny their access to AWS
resources.
12. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
Components of IAM
Users
Groups
Roles
Policies
The users created, can also be divided among groups, and
then the rules and policies that apply on the group, apply
on the user level as well.
13. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
Components of IAM
Users
Groups
Roles
Policies
An IAM role is an IAM entity that defines a set of
permissions for making AWS service requests. IAM roles are
not associated with a specific user or group. Instead, trusted
entities assume roles, such as IAM users, applications,
or AWS services such as EC2
14. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
Components of IAM
Users
Groups
Roles
Policies
To assign permissions to a user, group, role, or resource, you
create a policy, which is a document that explicitly lists
permissions.
15. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
Multi-Factor Authentication
16. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
Multi-Factor Authentication
First Layer of Security
Second Layer of Security
Log In
MFA Code
Password
18. Copyright © 2017, edureka and/or its affiliates. All rights reserved.
WebDriver vs. IDE vs. RC
➢ Data Warehouse is like a relational database designed for analytical needs.
➢ It functions on the basis of OLAP (Online Analytical Processing).
➢ It is a central location where consolidated data from multiple locations (databases) are stored.