At the core of Identity and Access Management (IAM) usage in AWS is a thorough knowledge of users and their purpose. In this course, Identity and Access Management on AWS: Users, you’ll learn how to properly create and use IAM users and optionally federate them with external directory services. First, you’ll learn about the root user that is the only user in a new account and why this user should be used to set up the IAM user that will do the rest of the configuration. Next, you’ll explore how to create users for both Management Console and programmatic access, as well as how to secure that access. Finally, you’ll discover how to federate IAM in AWS with external authentication services, such as Active Directory and web identities (including Amazon, Google, and Facebook), as well as other frameworks like OpenID and SAML. When you’re finished with this course, you’ll have a foundational knowledge of users in IAM on AWS that will help you as you move forward with securing your AWS infrastructure.
Brian is an energetic trainer and consultant with nearly 20 years of technical experience in datacenter management and design. As a virtualization instructor, Brian spends much of his time discussing the impact and intricacies of Software Defined Data Centers (SDDC), Software Defined Networking (SDN), and Software Defined Storage (SDS).
Course Overview While you might have heard that everyone gets 15 minutes of fame in their life, it shouldn't be because you learned cloud security the hard way. In this video series on Amazon Web Services, you'll learn how AWS' identity and access management service should be configured to keep your name out of the news. We'll start with the basics, logging into the AWS console and navigating the IAM interface. We then turn our attention to creating and managing user accounts where you'll learn that sometimes you'll create accounts that can't even log in to the Web Console. And that's where you'll learn about access keys and how to use them in your scripts and programs to gain access to things like S3 buckets and databases. Some accounts are so powerful that a password just isn't enough. So, we'll walk through the process of configuring multi-factor authentication. And while it might not be convenient to have to enter a username, password, and pin all the time, it sure beats the alternative, your 15 minutes of fame.