Vishnu Sfor@vishnus17vishnus.hashnode.net·Aug 15, 2022MongoDB Atlas AWS IAM passwordless authentication exampleMongoDB Atlas AWS IAM authentication mechanism allows users to use AWS IAM (Identity and Access Management) to establish a connection with MongoDB, which eliminates the need to manage and store passwords. This mechanism generates a security token wit...Cyril Kunjumon and 3 others are discussing this4 people are discussing thisDiscuss·36 likes·1.2K readsMongoDB
Kunal KushwahaforWeMakeDevskubeworld.hashnode.net·Mar 18, 2023Device and infrastructure security made easyA world of complexities As more and more organizations adopt a microservice architecture, the number of complexities keeps on increasing. Applications talk to multiple different services in order to complete their functions, some of these could be th...Discuss·18 likes·95 readsCase studiesWeMakeDevs
Palak BhawsarforPalak Bhawsarpalak-bhawsar.hashnode.net·Feb 27, 2023Create free tier AWS account, create IAM user and set CloudWatch alarm for billingIn this article, we will see how to create a free tier AWS account step by step. We will create the IAM user and enable the Multi-factor Authentication (MFA) for the root user and IAM user to secure your account. Also to safeguard our AWS account fro...Discuss·13 likesDevops
Alessandro GaggiaforLeapp blogacava-1675067608465.hashnode.net·Apr 21, 2023How to fix response did not contain a valid saml assertionIf you read this article, you are managing user identities outside of AWS and using Identity Provider (IdP) Federation to give these external identities permission to use AWS resources in your account. In this authentication process, one of the most ...Discuss·32 readsHow to fixSAML
GowthamforGowtham Writingsgowtham000.hashnode.net·Apr 16, 2023Demystify IAM Policies and PermissionsWhat are IAM Policies? From the AWS official docs, A policy is an object in AWS that, when associated with an entity or resource, defines its permissions. AWS evaluates these policies when a principal, such as a user, makes a request. Permissions in ...Discuss·38 readsAWS
Ayhan KaplanforAWS Fundamentalsawsfundamentals.hashnode.net·Apr 13, 2023AWS IAM Policies: A Practical ApproachAWS Identity and Access Management (IAM) is a service that enables you to manage fine-grained access to AWS services and resources securely. The basic principles of IAM rely on authentication (roles, users, groups) on the one hand, and authorization ...Discuss·3 likes·243 readsAWS
Rana M Zubairforranamzubair.hashnode.net·Apr 9, 2023Intro to AWS IAM: Provisioning and Securing the AWS ServicesAmazon Web Services (AWS) is a cloud computing platform that provides a lot of different services completely managed by AWS. Companies like Netflix, Airbnb, NASA, and various others use AWS to manage their services. Services can be divided into the f...Discuss·1 like·29 readsAWS
Muhammed Abiolafor/usr/share/blogmma.hashnode.net·Apr 8, 2023Introduction to AWS User and Access ManagementAWS Identity and Access Management (IAM) is probably the most important tool you’ll ever use in AWS. There are many incredible tools, but IAM is special. In the job of securing your AWS resources and ensuring that only authenticated and authorized us...DiscussAWS
Asad Rafiqueforar01.hashnode.net·Apr 3, 2023AWS IAM (Identity Access Management)IAM (Identity Access Management) is a single AWS account that lets Root users manage all the users in the environment or the team. IAM helps with authorization and Authentication Access for the team. We can have different permissions and different gr...DiscussAWS LearningAWS IAM
The impostorforThe impostor's blogtheimpostor.hashnode.net·Apr 2, 2023Essential AWS - IAM Best practicesMy way to AWS Solutions Architect IAM best practices Lock down the AWS root user The root user is an all-powerful and all-knowing identity in your AWS account. So, you need to be careful with malicious users were gain control of root-user credentia...DiscussAWS
Ayush DabhiforAyushDabhiayushdabhi.hashnode.net·Apr 1, 2023Building a serverless chatbot using Amazon Lex , Lambda , Amazon S3 , Amazon Cognito , IAM .Step 1: Creating a bot with Amazon Lex On the AWS Management Console, on the Search, Write Amazon Lex and choose Amazon Lex. On the Amazon Lex page, select Return to the V1 console, then click on Create. On the Create your bot page, choose th...Discuss·39 readsaws lambda
Nicolò MarchesiforLeapp blogacava-1675067608465.hashnode.net·Mar 31, 2023How to master and secure access and permissions in an AWS Landing ZoneToday we proudly announce a special collaboration: starting from the well-expressed concept of the Landing Zone on beSharp's blog Proud2beCloud, we deepened one of the key aspects for an AWS Landing Zone's correct implementation: the use of IAM Polic...Discuss·10 likes·142 readsAWS
Antonio CheltenhamforIAM SAM (I am Sam)cheltenham.hashnode.net·Mar 31, 2023The Power of Automation and IntelligenceOur previous articles delved into MFA Fatigue, recommendations to lower the risk of unauthorized access, and understanding who has access to what. This article will explore how to make your Identity Access Management (IAM) program smarter by introduc...DiscussIAM