AWS Authentication and Authorisation¶
EC2 application to Amazon services¶
For example EC2 to Amazon S3
- β You do not need to create IAM user for your application
- β Do not hardcode creadentials
- π‘ When you send a request to AWS service you must sign the request. It happens programmatically
- π‘Admin creates the role and assign permission to Amazon s3 bucket. He can create role for EC2 cases or Lambda or others. In our case for ec2
- π‘ You need to launch EC2 with Instance profile to pass the IAM role to the EC2
- π‘ The Application in EC2 need to retrieve the IAM role temporary credentials form EC2 and then make API call using these temporary credentials.
- The role can be assumed to many EC2 instances
Users developers, admins to AWS console¶
π‘ Admin creates users and groups and assigns users to group π‘ Users has name and password π‘ You can use federation to use your corporate accounts π‘ Admin creates polices and assigns them to users or groups π‘ Admin can enable MFA for users
References¶
- https://explore.skillbuilder.aws/learn/course/external/view/elearning/1851/aws-technical-essentials?da=sec&sec=prep Module 1
- AWS user guide:Β What Is IAM?(opens in a new tab)
- AWS user guide:Β IAM Identities (User, User Groups, and Roles)
- AWS user guide:Β Access Management for AWS Resources(opens in a new tab)
- AWS user guide:Β Security Best Practices in IAM(opens in a new tab)
- AWS blog:Β How to Create and Manage Users within AWS IAM Identity Center