|
|
|
|
LEADER |
00000cam a22000001i 4500 |
001 |
OR_on1268133943 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m d |
007 |
cr ||||||||||| |
008 |
210817s2021 enk o 000 0 eng d |
040 |
|
|
|a UKMGB
|b eng
|e rda
|e pn
|c UKMGB
|d OCLCO
|d EBLCP
|d OCLCF
|d UKAHL
|d OCLCO
|d OCLCQ
|d IEEEE
|
015 |
|
|
|a GBC1E3001
|2 bnb
|
016 |
7 |
|
|a 020308533
|2 Uk
|
020 |
|
|
|a 9781800567023
|q (ebook)
|
020 |
|
|
|a 1800567022
|
020 |
|
|
|z 9781800562288 (pbk.)
|
029 |
0 |
|
|a UKMGB
|b 020308533
|
035 |
|
|
|a (OCoLC)1268133943
|
037 |
|
|
|a 9781800567023
|b Packt Publishing Pvt. Ltd
|
037 |
|
|
|a 10162483
|b IEEE
|
050 |
|
4 |
|a TK5105.59
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Lehtinen, Jon,
|e author.
|
245 |
1 |
0 |
|a Implementing identity management on AWS :
|b a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments /
|c Jon Lehtinen, Steve Hutchinson.
|
264 |
|
1 |
|a Birmingham :
|b Packt Publishing,
|c 2021.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
588 |
|
|
|a Description based on CIP data; resource not viewed.
|
505 |
0 |
|
|a Cover -- Title page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Section 1: IAM and AWS -- Critical Concepts, Definitions, and Tools -- Chapter 1: An Introduction to IAM and AWS IAM Concepts -- Technical requirements -- Understanding IAM -- IAM applied to real-world use cases -- Exploring AWS IAM -- IAM for AWS and IAM on AWS -- The AWS IAM dashboard -- Principals, users, roles, and groups -- getting to know the building blocks of AWS IAM -- Authentication -- proving you are who you say you are
|
505 |
8 |
|
|a Authorization -- what you are allowed to do and why you are allowed to do it -- Putting it all together -- Signing in with the root user -- Summary -- Questions -- Chapter 2: An Introduction to the AWS CLI -- Technical requirements -- Exploring the AWS CLI basics -- What is the AWS CLI? -- Installing the AWS CLI -- AWS CLI configuration -- Testing out the CLI -- Profiles -- Using the AWS CLI -- Discovering command syntax -- Putting it all together -- creating a functional IAM user with the AWS CLI -- Attaching an administrator policy -- Creating and attaching a password
|
505 |
8 |
|
|a Creating and attaching the programmatic credentials -- Using the new profile -- Scripting -- Summary -- Questions -- Further reading -- Chapter 3: IAM User Management -- Technical requirements -- What is an IAM user account? -- Principals -- Managing and securing root IAM user accounts -- Differences between root user account and IAM user accounts -- Managing and securing IAM user accounts -- IAM user lifecycle management -- Password management -- Access key management -- MFA credential management -- Managing federated user accounts -- AWS Single Sign-On and federated users -- Summary
|
505 |
8 |
|
|a Questions -- Chapter 4: Access Management, Policies, and Permissions -- Technical requirements -- What is access management? -- Introducing the AWS access policy types -- The anatomy of an AWS JSON policy document -- Defining JSON policy document elements -- Exploring the AWS policy types -- Identity-based policies -- Resource-based policies -- IAM permissions boundaries -- Service control policies -- Access control lists -- Session policies -- Policy evaluation -- Governance -- Access Analyzer -- AWS CloudTrail -- Summary -- Questions -- Further reading -- Chapter 5: Introducing Amazon Cognito
|
505 |
8 |
|
|a Technical requirements -- What is Amazon Cognito? -- Amazon Cognito user pools -- Amazon Cognito identity pools -- Amazon Cognito use cases -- User authentication for application access -- User authentication and authorization for access to application resources -- User authentication and access to AWS services exposed through an application -- Federated user authentication and access to AWS services exposed through an application -- Creating an Amazon Cognito user pool -- Populating users in a user pool -- Bulk importing with CSV files -- Creating a user pool using the AWS CLI
|
520 |
|
|
|a Understand the IAM toolsets, capabilities, and paradigms of the AWS platform and learn how to apply practical identity use cases to AWS at the administrative and application level Key Features Learn administrative lifecycle management and authorization Extend workforce identity to AWS for applications deployed to Amazon Web Services (AWS) Understand how to use native AWS IAM capabilities with apps deployed to AWS Book DescriptionAWS identity management offers a powerful yet complex array of native capabilities and connections to existing enterprise identity systems for administrative and application identity use cases. This book breaks down the complexities involved by adopting a use-case-driven approach that helps identity and cloud engineers understand how to use the right mix of native AWS capabilities and external IAM components to achieve the business and security outcomes they want. You will begin by learning about the IAM toolsets and paradigms within AWS. This will allow you to determine how to best leverage them for administrative control, extending workforce identities to the cloud, and using IAM toolsets and paradigms on an app deployed on AWS. Next, the book demonstrates how to extend your on-premise administrative IAM capabilities to the AWS backplane, as well as how to make your workforce identities available for AWS-deployed applications. In the concluding chapters, you’ll learn how to use the native identity services with applications deployed on AWS. By the end of this IAM Amazon Web Services book, you will be able to build enterprise-class solutions for administrative and application identity using AWS IAM tools and external identity systems. What you will learn Understand AWS IAM concepts, terminology, and services Explore AWS IAM, Amazon Cognito, AWS SSO, and AWS Directory Service to solve customer and workforce identity problems Apply the concepts you learn about to solve business, process, and compliance challenges when expanding into AWS Navigate the AWS CLI to unlock the programmatic administration of AWS Explore how AWS IAM, its policy objects, and notational language can be applied to solve security and access management use cases Relate concepts easily to your own environment through IAM patterns and best practices Who this book is for Identity engineers and administrators, cloud administrators, security architects, or anyone who wants to explore and manage IAM solutions in AWS will find this book useful. Basic knowledge of AWS cloud infrastructure and services is required to understand the concepts covered in the book more effectively.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
610 |
2 |
0 |
|a Amazon Web Services (Firm)
|
610 |
2 |
7 |
|a Amazon Web Services (Firm)
|2 fast
|0 (OCoLC)fst01974501
|
650 |
|
0 |
|a Computer networks
|x Access control.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Access control.
|2 fast
|0 (OCoLC)fst00872298
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
700 |
1 |
|
|a Hutchinson, Steve,
|e author.
|
776 |
0 |
8 |
|i Print version:
|z 9781800562288
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781800562288/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH39138468
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6724605
|
994 |
|
|
|a 92
|b IZTAP
|