Solutions Architect Flashcards
IAM users
identity used for anything requiring long-term aws access
Principal
Person or Application that interacts with an IAM through a Request
ARNs(Amazon resource name)
Uniquely identify resources within any AWS accounts
IAM user account limits
5,000 users per account
IAM member limits
Up to 10 groups
IAM groups
containers for users
Groups are not what?
True identities
Can’t be referenced as principal in policy
IAM user
Single principal
IAM role
multiple users. represents a level of access
sts:AssumeRole
IAM Role is involved
Function as a service product
AWS Lambda
Lambda execution role
Lambda service that trusts AWS Lambda
-assumes the sts:AssumeRole and gets tokens for CloudWatch and S3
Break Glass For Key
Emergency Role situation in AWS
Single Sign-on or > 5000 identities
On-premise:
Existing Identities, Active Directory
Off-premise:
external accounts can’t be used directly w/S3
ID Federation
Having a small number of roles to manage and external identities can use these roles to access the AWS resources
Web Identity Federation
Needing millions of users to be authenticated into DynamoDB
Web Identities
No was credentials on the app
Uses existing customer logins
Scales to 100,000,000’s of accounts
Cross-Account Access
Allows an IAM user in one account access resources in another account
i.e.: 1,000’s identities to assume role to get to S3 bucket
AWS Organization
Management Account
SCPs
Service Control Policies:
- They don’t give permissions, are boundaries
- Control what an account CAN/CANNOT do via identity policies
- Appliable to organizations, OU’s, or individual
- Members can be effect, Management accounts can’t
What two policies are assigned to an IAM Role?
Permissions, Trust
Within AWS policies, what is always priority?
Explicit Deny
Which are features of IAM groups?
Admin groupings of IAM users, Can hold identity permissions
Which are true for IAM roles?
Roles can be assumed, When assumed - temporary credentials are generated