fbpx

December 12, 2023: We’ve updated this post to clarify that you can use both sts:audit_context and sts:identity_context can be used to create an identity-enhanced session. <hr> <p><a href=”https://aws.amazon.com/iam” target=”_blank” rel=”noopener”>AWS Identity and Access Management (IAM)</a> roles are a powerful way to manage permissions to resources in the <a href=”https://aws.amazon.com” target=”_blank” rel=”noopener”>Amazon Web Services (AWS)</a> Cloud. […]

Read more

<p>I’d like to personally invite you to attend the <a href=”http://aws.amazon.com/” target=”_blank” rel=”noopener”>Amazon Web Services (AWS)</a> security conference, <a href=”https://reinforce.awsevents.com/” target=”_blank” rel=”noopener”>AWS re:Inforce 2023</a>, in Anaheim, CA on June 13–14, 2023. You’ll have access to interactive educational content to address your security, compliance, privacy, and identity management needs. Join security experts, peers, leaders, and partners […]

Read more

AWS Private Certificate Authority (AWS Private CA) is a highly available, fully managed private certificate authority (CA) service that you can use to create CA hierarchies and issue private X.509 certificates. You can use these private certificates to establish endpoints for TLS encryption, cryptographically sign code, authenticate users, and more. <p>Based on customer feedback for […]

Read more

As described within an earlier post, Establishing the information perimeter on AWS , Amazon Internet Services (AWS) supplies a set of features you may use to implement the data perimeter to greatly help prevent unintended entry. One kind of unintended accessibility that companies desire to prevent is usage of corporate data by customers who usually […]

Read more

<a href=”https://aws.amazon.com/iam/” target=”_blank” rel=”noopener noreferrer”> AWS Identification and Access Administration (IAM) </a> has made it easier to work with IAM roles for the workloads which are running beyond AWS, with the <a href=”https://aws.amazon.com/about-aws/whats-new/2022/07/aws-identity-access-management-iam-roles-anywhere-workloads-outside-aws/” target=”_blank” rel=”noopener noreferrer”> discharge </a> of <a href=”https://docs.aws.amazon.com/rolesanywhere/latest/userguide/introduction.html” target=”_blank” rel=”noopener noreferrer”> IAM Functions Anywhere </a> . The abilities are extended by this […]

Read more

Customers often require help with permissions boundaries inside AWS Identification and Access Administration (IAM) so when, where, and how exactly to utilize them. A permissions boundary can be an IAM function that assists your centralized cloud IAM groups to safely empower the application developers to generate new IAM functions and plans in Amazon Web Providers […]

Read more

Several Amazon Web Services (AWS) customers opt for federation with SAML 2.0 to be able to use their current identity provider (IdP) and steer clear of managing multiple resources of identities. Some clients have earlier configured federation through the use of AWS Identification and Access Administration (IAM) with the endpoint signin.aws.amazon.com . Although this endpoint […]

Read more