Software Alternatives & Reviews
Table of contents
  1. Videos
  2. Social Mentions
  3. Comments

AWS Identity and Access Management

AWS Identity and Access Management enables you to securely control access to AWS services and resources for your users. subtitle

AWS Identity and Access Management Reviews and details

Screenshots and images

  • AWS Identity and Access Management Landing page
    Landing page //
    2022-02-02

Badges & Trophies

Promote AWS Identity and Access Management. You can add any of these badges on your website.
SaaSHub badge
Show embed code
SaaSHub badge
Show embed code

Videos

AWS re:Inforce 2023 - A first-principles approach: AWS Identity and Access Management (IAM) (IAM201)

AWS Identity and Access Management (IAM) Basics | AWS Training For Beginners

Social recommendations and mentions

We have tracked the following product recommendations or mentions on various public social media platforms and blogs. They can help you see what people think about AWS Identity and Access Management and what they use it for.
  • Controlling access to IAM-protected API endpoints with Cognito groups
    Each group will have an IAM role assigned. The roles will allow read/write and read access to the members of the FullAccess and ReadOnlyAccess groups, respectively. - Source: dev.to / 6 months ago
  • Using Cognito user ID to set up item-level access control to tables
    It's great, but where will IAM get the sub's value from? The ${cognito-identity.amazonaws.com:sub} policy variable refers to it, so there must be something somewhere that contains a sub property. - Source: dev.to / 8 months ago
  • Controlling access to resources with Cognito groups and IAM roles
    Say we have an application where we place users in multiple groups based on their permission sets. I'm not talking about IAM but application users, who sign up, log in and use our application. Those users can be administrators, read-only users, or can belong to other permission categories. I already discussed a way we can use Cognito user pool groups in access control to specific endpoints. - Source: dev.to / 8 months ago
  • Programmatically reacting to S3 bucket external access exposures
    The tool is part of IAM. First, we must create an analyzer, which can be account- or organization-based. The account or the organization will become the zone of trust. In this example, the zone of trust will be an account. - Source: dev.to / 8 months ago
  • Building Serverless Applications with AWS – Security
    I don't want to dive deeply into IAM. As a new Serverless developer, I don't think that's required for you to be effective. A link to the AWS IAM documentation does seem appropriate. Now what I do feel is appropriate for you to know are the following things:. - Source: dev.to / 9 months ago
  • Receiving Slack notifications when CloudTrail logging gets turned off
    An API destination is a separate resource, so EventBridge will need permission to invoke it. EventBridge will create a new IAM role if we don't already have one. Its permission policy looks like this:. - Source: dev.to / 9 months ago
  • Returning customized content based on location with S3 Object Lambda
    We must add some IAM statements to the elements of architecture. - Source: dev.to / 9 months ago
  • Programmatically retrieving secrets from Parameter Store and Secrets Manager
    The function's execution role must have the relevant IAM permissions. If we allow the ssm:GetParameters, ssm:GetParameter and ssm:GetParametersByPath actions in the role's policy, the function will be able to retrieve various types and numbers of parameters. If we choose to encrypt the secret with a customer-managed KMS key (i.e., not the default AWS-managed key), we must add the kms:Decrypt permission to the... - Source: dev.to / 9 months ago
  • 10 Key Features of AWS Every Developer Should Know
    AWS Identity and Access Management (IAM) provides robust security controls for managing user access to AWS resources. Developers can create and manage users, groups, and roles, allowing fine-grained control over permissions. IAM ensures that only authorized individuals can access sensitive resources, enhancing the overall security posture of your applications. Source: 10 months ago
  • AWS IAM CLI: a cheatsheet
    AWS Identity & Access Management, IAM in short, provides fine-grained access control across AWS services. - Source: dev.to / 10 months ago
  • Customizing error handling in Step Functions
    When the first state (Get task from 3rd party) throws a NotFoundError, Step Functions will send an email notification with the error message to the subscribers before the execution fails. Don't forget to ALLOW the SNS:Publish action in the Step Function's IAM role if you choose to send a notification. - Source: dev.to / 11 months ago
  • Security on AWS - AWS WAF x AWS App Runner
    AWS IAM (Identity and Access Management) is an AWS service that gives users access to other AWS services. I need an IAM role because I need permission from AWS App Runner to Amazon ECR image. - Source: dev.to / 12 months ago
  • Secure Your AWS Resources with IAM, Cognito, and Service Control Policies: 
    AWS Identity and Access Management. (n.d.). Retrieved April 25, 2023, from https://aws.amazon.com/iam/. - Source: dev.to / about 1 year ago
  • IAM Best Practices [cheat sheet included]
    While it is commonly associated with AWS, and their AWS IAM service, IAM is not limited to their platform. All cloud providers, such as Google Cloud and Azure DevOps, offer IAM solutions that allow users to access resources and systems. If you are looking for specific AWS IAM best practices, look no further than our AWS IAM Security Best Practices article:\ For the rest of this article, we will look at the... - Source: dev.to / about 1 year ago
  • How to Build a Contact Form With Next.js and AWS
    Before jumping into the tutorial, let’s cover the tech stack we’ll be using for this tutorial. Of course, as mentioned, we’ll be using Next.js and more specifically we’ll be making good use of the API routes feature. From an AWS perspective, we’ll be using a few services, which are SES, Lambda, API Gateway, and IAM. - Source: dev.to / about 1 year ago
  • The DevOps Guide to AWS Security Tools
    AWS Identity and Access Management (IAM) is a service that helps you securely control access to your AWS resources. IAM lets you centrally manage users, security credentials such as passwords, keys, and access policies that control which users and resources can access your AWS account. - Source: dev.to / about 1 year ago
  • Using S3 for File Storage in Laravel
    AWS Identity and Access Management (IAM) allows for fine-grained access management throughout the whole AWS infrastructure. You can control who has access to which services and resources, and under what conditions, using IAM. You can manage permissions to your workforce and systems with IAM policies to ensure least-privilege permissions and easily manage authorized and unauthorized resources. You can manage users... - Source: dev.to / over 1 year ago
  • AWS Beginner's Key Terminologies
    AWS IAM (Security, Identity, and Compliance) AWS Identity and Access Management is a web service that Amazon Web Services (AWS) customers can use to manage users and user permissions within AWS. Https://aws.amazon.com/iam. - Source: dev.to / over 1 year ago
  • Using Authorizer with DynamoDB and EKS
    Iam user with permission for DynamoDB, EKS, EC2, IAM Policy Creation, Route53, EBS Controller. - Source: dev.to / over 1 year ago
  • How do I add a https certificate to ALB ?
    If all you want is encryption on your ELB, you can generate a self-signed TLS certificate, upload it to either Amazon Certificate Manager (ACM) or AWS Identity and Access Management (IAM), and deploy it to your ALB/NLB/CLB. When you use a self-signed cert, you are acting as the Certificate Authority (CA), which means that nobody will trust the things you sign unless you get them to install your CA cert into their... Source: over 1 year ago
  • Serverless Event Driven AI as a Service
    The Lambda needs an API secret to calculate a hash for hash checking, so Twitter API details are stored encrypted in Secrets Manager (outside of the Git repository) and Lambda can pull these due to permissions granted with IAM. - Source: dev.to / over 1 year ago

Do you know an article comparing AWS Identity and Access Management to other products?
Suggest a link to a post with product alternatives.

Suggest an article

Generic AWS Identity and Access Management discussion

Log in or Post with

This is an informative page about AWS Identity and Access Management. You can review and discuss the product here. The primary details have not been verified within the last quarter, and they might be outdated. If you think we are missing something, please use the means on this page to comment or suggest changes. All reviews and comments are highly encouranged and appreciated as they help everyone in the community to make an informed choice. Please always be kind and objective when evaluating a product and sharing your opinion.