Identity and Access Management (AWS IAM) is one of the first services you are introduced to when learning about AWS.<\/a><\/p>\n\n\n\n
Everyone shouldn’t have access to everything.<\/p>\n\n\n\n
Exactly what you think of when you think of users in the real world.<\/p>\n\n\n\n
If you are setting up as AWS account for the first time you will begin with the root user and full administrative rights. Your first step should be creating a new user rather than using the root user for day to day activities. <\/p>\n\n\n\n
Users can have any combination of credentials:<\/p>\n\n\n\n
Default limits:<\/p>\n\n\n\n
A collection of users. Just like in the real world this could be a group of marketing users who need access to campaign data, finance users who need more sensitive data or customer services users who need customer data.<\/p>\n\n\n\n
Default limits:<\/p>\n\n\n\n
This is what defines the set of permissions<\/a> your users and services have. This where you decide if the ‘marketing’ role needs to be able to read\/write to an S3 bucket<\/a>, read\/write to the RDS<\/a>, and nothing else.<\/p>\n\n\n\n
When they are first created users have no permissions. These are added by creating and attaching policies.<\/p>\n\n\n\n
Policies come in three different forms:<\/p>\n\n\n\n
Managed Policies<\/strong> – policies provided by AWS and cannot be edited.
Customer Managed Policies<\/strong> – policies created by the customer, which you can edit.
Inline Policies<\/strong> – policies which are directly attached to a user.<\/p>\n\n\n\n
These can be created through the AWS Console using the predefined policy documents or using JSON to define these on a case-by-case basis when you can’t get what you need through the predefined policies.<\/p>\n\n\n\n
Default limit of:<\/p>\n\n\n\n