AWS Security Token Service: A Practical Tutorial

  Рет қаралды 9,716

Imposter Syndrome

Imposter Syndrome

Күн бұрын

Пікірлер: 15
@salva_next
@salva_next 2 ай бұрын
Great, that level of things, are complex, but with a good base is easy to understand thanks to your explanations, perfect procedure, and easy to read c# code. Really thanks!!
@stevenlewis8782
@stevenlewis8782 Жыл бұрын
User -> policy -> role -> policy -> resource ... phew! Seriously, though, this is very helpful. I like the code demo at the end.
@impostersyndromedev
@impostersyndromedev Жыл бұрын
Nice summary! It does feel like a bit much doesn’t it 😅
@stevenlewis8782
@stevenlewis8782 Жыл бұрын
@@impostersyndromedev At scale you want lots of smaller things, so I don't think it's too bad.
@senolerd
@senolerd Жыл бұрын
The first role creation page, at 2:11, ""Select trusted entities" part is all about STS. If you create the role with default trusted entities, the "AWS": "{account_id}" will be updated automatically to "AWS": "arn:aws:iam::{account_id}:root". To confirm this, create a role same way, then check back same role's "Trust relationship" after the creation. So, end of the video "StdUser" is having same privileged with root to this function!! Role creation journey should be done with two steps, policy -> role (with "AWS": "arn:aws:iam::{account_id}:user/StdUser). You are still getting STS' temporary credentials for your application (aws-cli/sdk). For further users; Thrust Relationship's Statement/Principal/AWS property also accepts list of user ARNs as string like ["{user1_ARN}", "{user2_ARN}"]
@pipasbr
@pipasbr Жыл бұрын
Very good! works well, thanks bro
@mars09
@mars09 Жыл бұрын
I saw that you gave 'AssumeRole' at 3:28 with Principal as anyone in the AWS Account while creating the role and then you created a policy "StsDemoAssumeRolePolicy" which you then added to that specific user. Is it redundant and unnecessary?
@impostersyndromedev
@impostersyndromedev Жыл бұрын
Yup. I mentioned it rather quickly in the dialog, but it's good that you caught that! Setting this would give you defense in depth. Particularly useful, in the event that new users are added or removed that shouldn't be able to assume the role.
@venkateshpolisetty8072
@venkateshpolisetty8072 11 ай бұрын
Hey. Nice Explaination. I have a question. I am the admin user in the aws account. I don't have any access key and secret key. I want to access s3 using temporary credentials. is it possible?
@RocketFanPro
@RocketFanPro 3 ай бұрын
Who’s buying some aws then
@GuilhermeCesarMedeiros
@GuilhermeCesarMedeiros Жыл бұрын
Would you have the code?
@dinirangapremanayake3873
@dinirangapremanayake3873 Жыл бұрын
can you give this code in javascript
@impostersyndromedev
@impostersyndromedev Жыл бұрын
I think you can just select Node.js for that. You can see it in the dropdown at 1:22 -- hope that helps!
@agustin7535
@agustin7535 Жыл бұрын
Too complex
@impostersyndromedev
@impostersyndromedev Жыл бұрын
Certainly! This is why it's essential for us to embrace automation and infrastructure-as-code using tools like Terraform or Cloud Formation. At some point, somebody will need to figure out the hard or complex things and make them easier through abstraction and encapsulation. That's why they pay us the big bucks. Happy coding! :)
AWS Assume IAM Role - Step by Step tutorial (Part-3)
17:24
Rahul Wagh
Рет қаралды 43 М.
Beat Ronaldo, Win $1,000,000
22:45
MrBeast
Рет қаралды 101 МЛН
How To Choose Mac N Cheese Date Night.. 🧀
00:58
Jojo Sim
Рет қаралды 115 МЛН
Чистка воды совком от денег
00:32
FD Vasya
Рет қаралды 5 МЛН
Amazon Cognito: SAML federation, IdP-initiated Login, and SAML Encryption
15:29
How to assume a role with AWS Security Token Service (STS)
15:07
Using AWS Security Token Service in Your .NET Application
9:55
Amazon Web Services
Рет қаралды 16 М.
AWS Security Token Service - AWS STS
13:24
AWS With Pravin Mishra
Рет қаралды 13 М.
AWS IAM Core Concepts You NEED to Know
21:40
Be A Better Dev
Рет қаралды 222 М.