Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Identity on AWS
Search
The Scale Factory
June 21, 2016
Technology
1
100
Identity on AWS
On 21st June 2016, Jon spoke at the London DevOps Meetup about Identity on AWS.
The Scale Factory
June 21, 2016
Tweet
Share
More Decks by The Scale Factory
See All by The Scale Factory
re:Invent Recap (January 2025)
scalefactory
0
450
Mastering Security and Compliance on AWS
scalefactory
0
29
The AWS Foundational Technical Review for UK Police Tech
scalefactory
0
180
Application and Platform Modernisation on AWS
scalefactory
0
120
AWS Control Tower for Compliance, Governance, and taming your cloud estate
scalefactory
0
97
Disaster Recovery on AWS
scalefactory
0
160
Navigating the SaaS Transformation Journey
scalefactory
0
55
ISO 27001 on AWS
scalefactory
0
470
How does compliance drive success in SaaS sales?
scalefactory
0
330
Other Decks in Technology
See All in Technology
“社内”だけで完結していた私が、AWS Community Builder になるまで
nagisa53
1
380
Understanding_Thread_Tuning_for_Inference_Servers_of_Deep_Models.pdf
lycorptech_jp
PRO
0
120
AIのAIによるAIのための出力評価と改善
chocoyama
2
550
PHPでWebブラウザのレンダリングエンジンを実装する
dip_tech
PRO
0
200
監視のこれまでとこれから/sakura monitoring seminar 2025
fujiwara3
11
3.9k
2年でここまで成長!AWSで育てたAI Slack botの軌跡
iwamot
PRO
4
700
Postman AI エージェントビルダー最新情報
nagix
0
110
5min GuardDuty Extended Threat Detection EKS
takakuni
0
140
AWS Summit Japan 2025 Community Stage - App workflow automation by AWS Step Functions
matsuihidetoshi
1
260
A2Aのクライアントを自作する
rynsuke
1
170
Node-RED × MCP 勉強会 vol.1
1ftseabass
PRO
0
140
OpenHands🤲にContributeしてみた
kotauchisunsun
1
430
Featured
See All Featured
Creating an realtime collaboration tool: Agile Flush - .NET Oxford
marcduiker
30
2.1k
Visualizing Your Data: Incorporating Mongo into Loggly Infrastructure
mongodb
46
9.6k
The Art of Delivering Value - GDevCon NA Keynote
reverentgeek
15
1.5k
Build The Right Thing And Hit Your Dates
maggiecrowley
36
2.8k
A Tale of Four Properties
chriscoyier
160
23k
Distributed Sagas: A Protocol for Coordinating Microservices
caitiem20
331
22k
Reflections from 52 weeks, 52 projects
jeffersonlam
351
20k
How GitHub (no longer) Works
holman
314
140k
Art, The Web, and Tiny UX
lynnandtonic
299
21k
Code Review Best Practice
trishagee
68
18k
Docker and Python
trallard
44
3.4k
Become a Pro
speakerdeck
PRO
28
5.4k
Transcript
None
IDENTITY MANAGEMENT IN AWS_ JON TOPPER | @jtopper | he/him/his
IDENTITY_ LATIN LATE LATIN idem same identitas identity quality of
being identical
IDENTITY ENABLES_ Access Control Trust Delegation Audit Trail Security Compliance
IAM CONCEPTS_ Root User Users Groups Roles Policies Tokens
Alice PowerUsers Bob Carla ci-server-role AmazonEC2ReadOnlyAccess AmazonS3FullAccess AdministratorAccess PowerUserAccess ci
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "NotAction": "iam:*",
"Resource": "*" } ] } PowerUserAccess
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [
"iam:*LoginProfile", "iam:*AccessKey*", "iam:*SSHPublicKey*" ], "Resource": "arn:aws:iam::00001:user/${aws:username}" }, { "Effect": "Allow", "Action": [ "iam:ListAccount*", "iam:GetAccountSummary", "iam:GetAccountPasswordPolicy", "iam:ListUsers" ], "Resource": "*" } ] } ManageOwnCredentials
Alice PowerUsers Bob Carla ci-server-role AmazonEC2ReadOnlyAccess AmazonS3FullAccess AdministratorAccess PowerUserAccess ci
ManageOwnCredentials
Alice PowerUsers Bob Carla ci-server-role AmazonEC2ReadOnlyAccess AmazonS3FullAccess AdministratorAccess PowerUserAccess ci
ManageOwnCredentials
EC2 ROLES_ $ curl http://169.254.169.254/latest/meta-data/iam/security-credentials/ci-server-role { "Code" : "Success", "LastUpdated"
: "2012-04-26T16:39:16Z", "Type" : "AWS-HMAC", "AccessKeyId" : "AKIAIOSFODNN7EXAMPLE", "SecretAccessKey" : "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY", "Token" : "token", "Expiration" : "2012-04-27T22:39:16Z" }
Alice PowerUsers Bob Carla ci-server-role AmazonEC2ReadOnlyAccess AmazonS3FullAccess AdministratorAccess PowerUserAccess ci
ManageOwnCredentials
MULTI FACTOR AUTHENTICATION_
IAM BEST PRACTICE_ User Per Individual No Root User Multi-Factor
Auth Token Least Privilege CloudTrail
CROSS-ACCOUNT ROLE ASSUMPTION_
AssumeCustomerRole Bob Carla ScaleFactoryUser PowerUserAccess CUSTOMER MGMT ACCOUNT (00005) SCALE
FACTORY SSO ACCOUNT (00001) AssumeRoleCustomerMgmt Trust Relationship Policy
CUSTOMER MGMT ACCOUNT (00005) SCALE FACTORY SSO ACCOUNT (00001) AssumeRoleCustomerMgmt
Trust Relationship Policy { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::00001:root" }, "Action": "sts:AssumeRole", "Condition": { "Bool": { "aws:MultiFactorAuthPresent": "true" } } } ] } { "Version": "2012-10-17", "Statement": { "Effect": "Allow", "Action": "sts:AssumeRole", "Resource": ”arn:aws:iam::00005:role/ScaleFactoryUser" } }
None
EXTERNAL SOURCE OF IDENTITY_
None
None
ScaleFactorySSOUser PowerUserAccess Trust Relationship Policy Identity Providers https://blog.faisalmisle.com/2015/11/using-google-apps-saml-sso-to-do-one-click-login-to-aws/
AWS COGNITO_
None
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [
"dynamodb:GetItem", "dynamodb:BatchGetItem", "dynamodb:Query", "dynamodb:PutItem", "dynamodb:UpdateItem", "dynamodb:DeleteItem", "dynamodb:BatchWriteItem" ], "Resource": [ "arn:aws:dynamodb:us-west-2:123456789012:table/MyTable" ], "Condition": { "ForAllValues:StringEquals": { "dynamodb:LeadingKeys": ["${cognito-identity.amazonaws.com:sub}"] } } } ] }
YOUR IAM MIGHT NEED WORK IF YOU_ Log in with
the root account Have >1 identity for each person Don’t use MFA Hard-code tokens in app config
YOU MAY BENEFIT FROM_ Role Assumption Cross-Account Access Federated Identity
Cognito
KEEP IN TOUCH_ http:/ /www.scalefactory.com/ https:/ /github.com/scalefactory @jtopper / @scalefactory
[email protected]