Cargando…

Implementing identity management on AWS : a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments /

Understand the IAM toolsets, capabilities, and paradigms of the AWS platform and learn how to apply practical identity use cases to AWS at the administrative and application level Key Features Learn administrative lifecycle management and authorization Extend workforce identity to AWS for applicatio...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Lehtinen, Jon (Autor), Hutchinson, Steve (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2021.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title page
  • Copyright and Credits
  • Dedication
  • Foreword
  • Contributors
  • Table of Contents
  • Preface
  • Section 1: IAM and AWS
  • Critical Concepts, Definitions, and Tools
  • Chapter 1: An Introduction to IAM and AWS IAM Concepts
  • Technical requirements
  • Understanding IAM
  • IAM applied to real-world use cases
  • Exploring AWS IAM
  • IAM for AWS and IAM on AWS
  • The AWS IAM dashboard
  • Principals, users, roles, and groups
  • getting to know the building blocks of AWS IAM
  • Authentication
  • proving you are who you say you are
  • Authorization
  • what you are allowed to do and why you are allowed to do it
  • Putting it all together
  • Signing in with the root user
  • Summary
  • Questions
  • Chapter 2: An Introduction to the AWS CLI
  • Technical requirements
  • Exploring the AWS CLI basics
  • What is the AWS CLI?
  • Installing the AWS CLI
  • AWS CLI configuration
  • Testing out the CLI
  • Profiles
  • Using the AWS CLI
  • Discovering command syntax
  • Putting it all together
  • creating a functional IAM user with the AWS CLI
  • Attaching an administrator policy
  • Creating and attaching a password
  • Creating and attaching the programmatic credentials
  • Using the new profile
  • Scripting
  • Summary
  • Questions
  • Further reading
  • Chapter 3: IAM User Management
  • Technical requirements
  • What is an IAM user account?
  • Principals
  • Managing and securing root IAM user accounts
  • Differences between root user account and IAM user accounts
  • Managing and securing IAM user accounts
  • IAM user lifecycle management
  • Password management
  • Access key management
  • MFA credential management
  • Managing federated user accounts
  • AWS Single Sign-On and federated users
  • Summary
  • Questions
  • Chapter 4: Access Management, Policies, and Permissions
  • Technical requirements
  • What is access management?
  • Introducing the AWS access policy types
  • The anatomy of an AWS JSON policy document
  • Defining JSON policy document elements
  • Exploring the AWS policy types
  • Identity-based policies
  • Resource-based policies
  • IAM permissions boundaries
  • Service control policies
  • Access control lists
  • Session policies
  • Policy evaluation
  • Governance
  • Access Analyzer
  • AWS CloudTrail
  • Summary
  • Questions
  • Further reading
  • Chapter 5: Introducing Amazon Cognito
  • Technical requirements
  • What is Amazon Cognito?
  • Amazon Cognito user pools
  • Amazon Cognito identity pools
  • Amazon Cognito use cases
  • User authentication for application access
  • User authentication and authorization for access to application resources
  • User authentication and access to AWS services exposed through an application
  • Federated user authentication and access to AWS services exposed through an application
  • Creating an Amazon Cognito user pool
  • Populating users in a user pool
  • Bulk importing with CSV files
  • Creating a user pool using the AWS CLI