AWS Identity and Access Management (IAM)
AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
IAM is a feature of your AWS account offered at no additional charge. You will be charged only for use of other AWS services by your users.
Fine-grained access control to AWS resources
IAM enables your usersto control accessto AWS service APIs and to specific resources. IAM also enables you to add specific conditionssuch as time of day to control how a user can use AWS, their originating IP address, whether they are using SSL, or whether they have authenticated with a multi-factor authentication device.
Multi-factor authentication for highly privileged users
Protect your AWS environment by using AWS MFA, a security feature available at no extra cost that augments user name and password credentials. MFA requires users to prove physical possession of a hardware MFA token or MFA-enabled mobile device by providing a valid MFA code.
IAM helps you analyze accessacross your AWS environment. Your security teams and administrators can quickly validate that your policies only provide the intended public and cross-account access to your resources. You can also easily identify and refine your policies to allow access to only the services being used. This helps you to better adhere to the principle of least privilege.
Integrate with your corporate directory
IAM can be used to grant your employees and applications federated accessto the AWS Management Console and AWS service APIs, using your existing identity systemssuch as Microsoft Active Directory. You can use any identity managementsolution that supports SAML 2.0, or feel free to use one of our federation samples (AWS Console SSOor API federation).
How it works
AWS IAM allows you to:
- Manage IAM usersand their access– You can create users in IAM, assign them individual security credentials (in other words, access keys, passwords, and multi-factor authenticationdevices), or request temporary security credentials to provide users access to AWS services and resources. You can manage permissions in order to control which operations a user can perform.
- Manage IAM rolesand their permissions– You can create roles in IAM and manage permissions to control which operations can be performed by the entity, or AWS service, that assumes the role. You can also define which entity is allowed to assume the role. In addition, you can use service-linked rolesto delegate permissions to AWS services that create and manage AWS resources on your behalf.
- Manage federated usersand their permissions– You can enable identity federation to allow existing identities (users, groups, and roles) in your enterprise to access the AWS Management Console, call AWS APIs, and access resources, without the need to create an IAM user for each identity. Use any identity management solution that supports SAML 2.0, or use one of our federation samples (AWS Console SSOor API federation).
Free Porn Videos - Sex Movies Download - HornyRls.net