SlideShare a Scribd company logo
AD Authenticate the AWS Management Console
Alan Williams
Enterprise Architect
Advanced AWS Meetup – June 2015
© 2015 Autodesk
 Technology Generalist
 Background in Infrastructure
 @ Autodesk ~10 years
 Spoken at OpenWorld, .conf and re:Invent
 AWS user for ~5 years
 Motorcyclist
 Soft spot for pit bulls
 @alanwill on
Who Am I?
© 2015 Autodesk
 Leader in 3D design, engineering and
entertainment software
 Introduced AutoCAD in 1982
 Empowering the Maker movement
 Helping our customers imagine, design
and create a better world
 ~11,000 global employees
Who is Autodesk?
autodesk.com/careers
© 2015 Autodesk
 Problem
 Solution
 Demo
 How
 Benefits
 Next
Agenda
Problem
© 2015 Autodesk
 Identity Management
 Too many
 Lots of AWS accounts
 Access Control
 Too complex to manage
 Too difficult to enforce
 Inconvenient
 What’s my password?
Problem
Solution
© 2015 Autodesk
© 2015 Autodesk
 AWS Federated Logins
 IAM Identity Providers
 On-premises Identity Provider
 PingFederate, Okta etc…
 On-premises Identity Store
 Active Directory
 SAML
 Security Assertion Markup Language
Solution
Demo
How
(the gory details)
© 2015 Autodesk
Workflow
*Diagram adapted from AWS STS documentation for Autodesk relevance
http://docs.aws.amazon.com/STS/latest/UsingSTS/STSMgmtConsole-SAML.html
© 2015 Autodesk
 Go to IdP page
 Example: https://aws.company.com
 Enter AD credentials
 jdoe / ********
#1 – IdP Initiated SSO
© 2015 Autodesk
 AD
 Validates credentials
 Responds with all user’s security groups to IdP
 IdP
 Applies filters and performs field extraction
 Sends to client AWS account(s) + IAM role(s) in
SAML assertion
#2/3 – Authentication
© 2015 Autodesk
AD Security Group Naming Convention
© 2015 Autodesk
 Client posts assertion to AWS SSO
endpoint
 AWS validates request and matches AWS
account numbers and roles
 Presents list of AWS accounts to user for
sign in
#4/5/6 - Authorization
© 2015 Autodesk
© 2015 Autodesk
How
(on the AWS end)
© 2015 Autodesk
Create IAM Identity Provider
© 2015 Autodesk
Create IAM Identity Provider
© 2015 Autodesk
Create IAM Identity Provider
© 2015 Autodesk
Create IAM Identity Provider
© 2015 Autodesk
Create IAM Identity Provider
© 2015 Autodesk
Create an IAM Role
© 2015 Autodesk
Create IAM Role
© 2015 Autodesk
Create IAM Role
© 2015 Autodesk
Create IAM Role
© 2015 Autodesk
Create IAM Role
© 2015 Autodesk
© 2015 Autodesk
Role Name Example IAM Role Policy
Account-Admin AdministratorAccess Policy
Account-ReadOnly ReadOnlyAccess Policy
Application-Admins PowerUserAccess Policy
Database-Admins AmazonRDSFullAccess +
AmazonRedshiftFullAccess Policies
Network-Admins AmazonVPCFullAccess +
AWSDirectConnectFullAccess Policies
Security-Admins SecurityAudit Policy
Server-Admins AmazonEC2FullAccess Policy
Optional: Multiple Roles
© 2015 Autodesk
Optional: Multiple Roles, same account
© 2015 Autodesk
Optional: Two Factor Authentication
© 2015 Autodesk
 Create AD Security Groups
 following naming convention
 Create IAM Identity Provider
 Create IAM Roles
On-boarding New Accounts
© 2015 Autodesk
 AD security group membership
 Role based access control
Managing Access
Benefits
© 2015 Autodesk
 Standardized authentication
 Improved security
 Convenient user experience
 Flexible
 Scalable to 100s+ accounts
Benefits
What’s
Next
© 2015 Autodesk
 IAM Keys Vending Machine
 Access/Secret Key self service portal
 Temporary, expires in 24 hours
Next Steps
© 2015 Autodesk
 Using Identity Providers
 http://goo.gl/qf7NpN
 Using SAML Providers
 http://goo.gl/cBMswu
 IAM Federated User Access
 http://goo.gl/5nIMt9
Documentation Resources
© 2015 Autodesk
Autodesk is a registered trademark of Autodesk, Inc., and/or its subsidiaries and/or affiliates in the USA and/or other countries. All other brand names, product names, or trademarks belong to
their respective holders. Autodesk reserves the right to alter product and services offerings, and specifications and pricing at any time without notice, and is not responsible for typographical or
graphical errors that may appear in this document.
© 2015 Autodesk. All rights reserved.

More Related Content

What's hot

What's hot (20)

AWS Certification | AWS Architect Certification Training | AWS Tutorial | AWS...
AWS Certification | AWS Architect Certification Training | AWS Tutorial | AWS...AWS Certification | AWS Architect Certification Training | AWS Tutorial | AWS...
AWS Certification | AWS Architect Certification Training | AWS Tutorial | AWS...
 
Business Agility: Taking an App Global (at Speed) - Session Sponsored by ITOC
Business Agility: Taking an App Global (at Speed) - Session Sponsored by ITOCBusiness Agility: Taking an App Global (at Speed) - Session Sponsored by ITOC
Business Agility: Taking an App Global (at Speed) - Session Sponsored by ITOC
 
Customer Sharing: Trend Micro - Analytic Engine - A common Big Data computati...
Customer Sharing: Trend Micro - Analytic Engine - A common Big Data computati...Customer Sharing: Trend Micro - Analytic Engine - A common Big Data computati...
Customer Sharing: Trend Micro - Analytic Engine - A common Big Data computati...
 
Amazon Lightsail: Jumpstart Your Cloud Project for a Low, Predictable Price.
Amazon Lightsail: Jumpstart Your Cloud Project for a Low, Predictable Price. Amazon Lightsail: Jumpstart Your Cloud Project for a Low, Predictable Price.
Amazon Lightsail: Jumpstart Your Cloud Project for a Low, Predictable Price.
 
T3 - Deploy, manage, and scale your apps
T3 - Deploy, manage, and scale your appsT3 - Deploy, manage, and scale your apps
T3 - Deploy, manage, and scale your apps
 
AWS Glacier Tutorial | Edureka
AWS Glacier Tutorial | EdurekaAWS Glacier Tutorial | Edureka
AWS Glacier Tutorial | Edureka
 
OTT on AWS – Build vs. Buy
OTT on AWS – Build vs. Buy OTT on AWS – Build vs. Buy
OTT on AWS – Build vs. Buy
 
Amazon Lightsail
Amazon LightsailAmazon Lightsail
Amazon Lightsail
 
Extending VSTS Build/Release Pipelines to AWS - WIN402 - re:Invent 2017
Extending VSTS Build/Release Pipelines to AWS - WIN402 - re:Invent 2017Extending VSTS Build/Release Pipelines to AWS - WIN402 - re:Invent 2017
Extending VSTS Build/Release Pipelines to AWS - WIN402 - re:Invent 2017
 
Intro to AWS Developer Tools, featuring AWS CodeStar
Intro to AWS Developer Tools, featuring AWS CodeStarIntro to AWS Developer Tools, featuring AWS CodeStar
Intro to AWS Developer Tools, featuring AWS CodeStar
 
Container Management on AWS with ECS, Docker and Blox - Level 400
Container Management on AWS with ECS, Docker and Blox - Level 400Container Management on AWS with ECS, Docker and Blox - Level 400
Container Management on AWS with ECS, Docker and Blox - Level 400
 
AWS Lambda Tutorial | Introduction to AWS Lambda | AWS Tutorial | AWS Trainin...
AWS Lambda Tutorial | Introduction to AWS Lambda | AWS Tutorial | AWS Trainin...AWS Lambda Tutorial | Introduction to AWS Lambda | AWS Tutorial | AWS Trainin...
AWS Lambda Tutorial | Introduction to AWS Lambda | AWS Tutorial | AWS Trainin...
 
Workshop AWS IoT @ SIDO
Workshop AWS IoT @ SIDOWorkshop AWS IoT @ SIDO
Workshop AWS IoT @ SIDO
 
Amazon Lightsail Tutorial | What is Amazon Lightsail? | AWS Certification Tra...
Amazon Lightsail Tutorial | What is Amazon Lightsail? | AWS Certification Tra...Amazon Lightsail Tutorial | What is Amazon Lightsail? | AWS Certification Tra...
Amazon Lightsail Tutorial | What is Amazon Lightsail? | AWS Certification Tra...
 
Moving Viadeo to AWS (2015)
Moving Viadeo to AWS (2015)Moving Viadeo to AWS (2015)
Moving Viadeo to AWS (2015)
 
Introduction To AWS & AWS Lambda
Introduction To AWS & AWS LambdaIntroduction To AWS & AWS Lambda
Introduction To AWS & AWS Lambda
 
Serverless architectures on aws
Serverless architectures on awsServerless architectures on aws
Serverless architectures on aws
 
AWS Well Architected Framework
AWS Well Architected FrameworkAWS Well Architected Framework
AWS Well Architected Framework
 
AWS architecture and a human body
AWS architecture and a human bodyAWS architecture and a human body
AWS architecture and a human body
 
AWS Elastic Beanstalk Tutorial | AWS Certification | AWS Tutorial | Edureka
AWS Elastic Beanstalk Tutorial | AWS Certification | AWS Tutorial | EdurekaAWS Elastic Beanstalk Tutorial | AWS Certification | AWS Tutorial | Edureka
AWS Elastic Beanstalk Tutorial | AWS Certification | AWS Tutorial | Edureka
 

Viewers also liked

Viewers also liked (20)

Presentation
PresentationPresentation
Presentation
 
Javantura v4 - Keycloak – instant login for your app - Marko Štrukelj
Javantura v4 - Keycloak – instant login for your app - Marko ŠtrukeljJavantura v4 - Keycloak – instant login for your app - Marko Štrukelj
Javantura v4 - Keycloak – instant login for your app - Marko Štrukelj
 
SSO_Good_Bad_Ugly
SSO_Good_Bad_UglySSO_Good_Bad_Ugly
SSO_Good_Bad_Ugly
 
Openshift v3-a-revolucao-dos-containers-3
Openshift v3-a-revolucao-dos-containers-3Openshift v3-a-revolucao-dos-containers-3
Openshift v3-a-revolucao-dos-containers-3
 
Keycloak で SSO #渋谷java
Keycloak で SSO #渋谷javaKeycloak で SSO #渋谷java
Keycloak で SSO #渋谷java
 
Sprint 38 review
Sprint 38 reviewSprint 38 review
Sprint 38 review
 
Microservices with WildFly Swarm - JavaSI 2016
Microservices with WildFly Swarm - JavaSI 2016Microservices with WildFly Swarm - JavaSI 2016
Microservices with WildFly Swarm - JavaSI 2016
 
Writing Java EE microservices using WildFly Swarm
Writing Java EE microservices using WildFly SwarmWriting Java EE microservices using WildFly Swarm
Writing Java EE microservices using WildFly Swarm
 
WildFly Swarm: Criando Microservices com Java EE 7
WildFly Swarm: Criando Microservices com Java EE 7WildFly Swarm: Criando Microservices com Java EE 7
WildFly Swarm: Criando Microservices com Java EE 7
 
Security enforcement of Microservices with API Management
Security enforcement of Microservices with API ManagementSecurity enforcement of Microservices with API Management
Security enforcement of Microservices with API Management
 
WildFly Swarm - Rightsize Your Java EE Apps
WildFly Swarm - Rightsize Your Java EE AppsWildFly Swarm - Rightsize Your Java EE Apps
WildFly Swarm - Rightsize Your Java EE Apps
 
Security enforcement of Java Microservices with Apiman & Keycloak
Security enforcement of Java Microservices with Apiman & KeycloakSecurity enforcement of Java Microservices with Apiman & Keycloak
Security enforcement of Java Microservices with Apiman & Keycloak
 
Javantura v4 - What’s NOT new in modular Java - Milen Dyankov
Javantura v4 - What’s NOT new in modular Java - Milen DyankovJavantura v4 - What’s NOT new in modular Java - Milen Dyankov
Javantura v4 - What’s NOT new in modular Java - Milen Dyankov
 
Javantura v4 - (Spring)Boot your application on Red Hat middleware stack - Al...
Javantura v4 - (Spring)Boot your application on Red Hat middleware stack - Al...Javantura v4 - (Spring)Boot your application on Red Hat middleware stack - Al...
Javantura v4 - (Spring)Boot your application on Red Hat middleware stack - Al...
 
Security Day IAM Recommended Practices
Security Day IAM Recommended PracticesSecurity Day IAM Recommended Practices
Security Day IAM Recommended Practices
 
Authentication - Alberto Bellotti - ManageIQ Design Summit 2016
Authentication - Alberto Bellotti - ManageIQ Design Summit 2016Authentication - Alberto Bellotti - ManageIQ Design Summit 2016
Authentication - Alberto Bellotti - ManageIQ Design Summit 2016
 
High Availability - Brett Thurber - ManageIQ Design Summit 2016
High Availability - Brett Thurber - ManageIQ Design Summit 2016High Availability - Brett Thurber - ManageIQ Design Summit 2016
High Availability - Brett Thurber - ManageIQ Design Summit 2016
 
Migrating a US Army Application to the Cloud | AWS Public Sector Summit 2016
Migrating a US Army Application to the Cloud | AWS Public Sector Summit 2016Migrating a US Army Application to the Cloud | AWS Public Sector Summit 2016
Migrating a US Army Application to the Cloud | AWS Public Sector Summit 2016
 
Javantura v4 - Cloud-native Architectures and Java - Matjaž B. Jurič
Javantura v4 - Cloud-native Architectures and Java - Matjaž B. JuričJavantura v4 - Cloud-native Architectures and Java - Matjaž B. Jurič
Javantura v4 - Cloud-native Architectures and Java - Matjaž B. Jurič
 
Cloud Foundry Compared With Other PaaSes (Cloud Foundry Summit 2014)
Cloud Foundry Compared With Other PaaSes (Cloud Foundry Summit 2014)Cloud Foundry Compared With Other PaaSes (Cloud Foundry Summit 2014)
Cloud Foundry Compared With Other PaaSes (Cloud Foundry Summit 2014)
 

Similar to AD Authenticate All The Things

Similar to AD Authenticate All The Things (20)

VMware Cloud on AWS: A World of Unique Integrations Between VMware and AWS - ...
VMware Cloud on AWS: A World of Unique Integrations Between VMware and AWS - ...VMware Cloud on AWS: A World of Unique Integrations Between VMware and AWS - ...
VMware Cloud on AWS: A World of Unique Integrations Between VMware and AWS - ...
 
How You Can Use AWS Identity Services to Be Successful on Your AWS Cloud Journey
How You Can Use AWS Identity Services to Be Successful on Your AWS Cloud JourneyHow You Can Use AWS Identity Services to Be Successful on Your AWS Cloud Journey
How You Can Use AWS Identity Services to Be Successful on Your AWS Cloud Journey
 
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdfJeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
 
Best practices for choosing identity solutions for applications + workloads -...
Best practices for choosing identity solutions for applications + workloads -...Best practices for choosing identity solutions for applications + workloads -...
Best practices for choosing identity solutions for applications + workloads -...
 
AWS Chicago user group: AWS Platform for .NET Developers
AWS Chicago user group: AWS Platform for .NET DevelopersAWS Chicago user group: AWS Platform for .NET Developers
AWS Chicago user group: AWS Platform for .NET Developers
 
AWS Enterprise Summit London 2015 | Adobe Creative Cloud and AWS
 AWS Enterprise Summit London 2015 | Adobe Creative Cloud and AWS AWS Enterprise Summit London 2015 | Adobe Creative Cloud and AWS
AWS Enterprise Summit London 2015 | Adobe Creative Cloud and AWS
 
Simplifying Microsoft Architectures with AWS Services (WIN306) - AWS re:Inven...
Simplifying Microsoft Architectures with AWS Services (WIN306) - AWS re:Inven...Simplifying Microsoft Architectures with AWS Services (WIN306) - AWS re:Inven...
Simplifying Microsoft Architectures with AWS Services (WIN306) - AWS re:Inven...
 
2018 10-17 J1 3C - Hybrid architectures with Amazon Web Services, Office 365 ...
2018 10-17 J1 3C - Hybrid architectures with Amazon Web Services, Office 365 ...2018 10-17 J1 3C - Hybrid architectures with Amazon Web Services, Office 365 ...
2018 10-17 J1 3C - Hybrid architectures with Amazon Web Services, Office 365 ...
 
AWS business essentials - Toronto
AWS   business essentials - TorontoAWS   business essentials - Toronto
AWS business essentials - Toronto
 
AWS business essentials
AWS business essentials AWS business essentials
AWS business essentials
 
Cloud Migration Insights Forum, Melbourne
Cloud Migration Insights Forum, MelbourneCloud Migration Insights Forum, Melbourne
Cloud Migration Insights Forum, Melbourne
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Migrate Microsoft Applications to AWS like an Expert (WIN301) - AWS re:Invent...
Migrate Microsoft Applications to AWS like an Expert (WIN301) - AWS re:Invent...Migrate Microsoft Applications to AWS like an Expert (WIN301) - AWS re:Invent...
Migrate Microsoft Applications to AWS like an Expert (WIN301) - AWS re:Invent...
 
AWS Security By Design
AWS Security By DesignAWS Security By Design
AWS Security By Design
 
Cloud Migration Insights Forum, Sydney
Cloud Migration Insights Forum, SydneyCloud Migration Insights Forum, Sydney
Cloud Migration Insights Forum, Sydney
 
Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...
Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...
Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...
 
Migrate & Modernize your legacy Microsoft applications with AWS
Migrate & Modernize your legacy Microsoft applications with AWSMigrate & Modernize your legacy Microsoft applications with AWS
Migrate & Modernize your legacy Microsoft applications with AWS
 
AWS identity services - Enabling & securing your cloud journey - SEC202 - San...
AWS identity services - Enabling & securing your cloud journey - SEC202 - San...AWS identity services - Enabling & securing your cloud journey - SEC202 - San...
AWS identity services - Enabling & securing your cloud journey - SEC202 - San...
 
AWSome Day MODULE 4 - Security
AWSome Day MODULE 4 - SecurityAWSome Day MODULE 4 - Security
AWSome Day MODULE 4 - Security
 
AWS CLI Tutorial | Introduction To AWS Command Line Interface | AWS Training ...
AWS CLI Tutorial | Introduction To AWS Command Line Interface | AWS Training ...AWS CLI Tutorial | Introduction To AWS Command Line Interface | AWS Training ...
AWS CLI Tutorial | Introduction To AWS Command Line Interface | AWS Training ...
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 

AD Authenticate All The Things

  • 1. AD Authenticate the AWS Management Console Alan Williams Enterprise Architect Advanced AWS Meetup – June 2015
  • 2. © 2015 Autodesk  Technology Generalist  Background in Infrastructure  @ Autodesk ~10 years  Spoken at OpenWorld, .conf and re:Invent  AWS user for ~5 years  Motorcyclist  Soft spot for pit bulls  @alanwill on Who Am I?
  • 3. © 2015 Autodesk  Leader in 3D design, engineering and entertainment software  Introduced AutoCAD in 1982  Empowering the Maker movement  Helping our customers imagine, design and create a better world  ~11,000 global employees Who is Autodesk?
  • 5. © 2015 Autodesk  Problem  Solution  Demo  How  Benefits  Next Agenda
  • 7. © 2015 Autodesk  Identity Management  Too many  Lots of AWS accounts  Access Control  Too complex to manage  Too difficult to enforce  Inconvenient  What’s my password? Problem
  • 10. © 2015 Autodesk  AWS Federated Logins  IAM Identity Providers  On-premises Identity Provider  PingFederate, Okta etc…  On-premises Identity Store  Active Directory  SAML  Security Assertion Markup Language Solution
  • 11. Demo
  • 13. © 2015 Autodesk Workflow *Diagram adapted from AWS STS documentation for Autodesk relevance http://docs.aws.amazon.com/STS/latest/UsingSTS/STSMgmtConsole-SAML.html
  • 14. © 2015 Autodesk  Go to IdP page  Example: https://aws.company.com  Enter AD credentials  jdoe / ******** #1 – IdP Initiated SSO
  • 15. © 2015 Autodesk  AD  Validates credentials  Responds with all user’s security groups to IdP  IdP  Applies filters and performs field extraction  Sends to client AWS account(s) + IAM role(s) in SAML assertion #2/3 – Authentication
  • 16. © 2015 Autodesk AD Security Group Naming Convention
  • 17. © 2015 Autodesk  Client posts assertion to AWS SSO endpoint  AWS validates request and matches AWS account numbers and roles  Presents list of AWS accounts to user for sign in #4/5/6 - Authorization
  • 21. © 2015 Autodesk Create IAM Identity Provider
  • 22. © 2015 Autodesk Create IAM Identity Provider
  • 23. © 2015 Autodesk Create IAM Identity Provider
  • 24. © 2015 Autodesk Create IAM Identity Provider
  • 25. © 2015 Autodesk Create IAM Identity Provider
  • 26. © 2015 Autodesk Create an IAM Role
  • 32. © 2015 Autodesk Role Name Example IAM Role Policy Account-Admin AdministratorAccess Policy Account-ReadOnly ReadOnlyAccess Policy Application-Admins PowerUserAccess Policy Database-Admins AmazonRDSFullAccess + AmazonRedshiftFullAccess Policies Network-Admins AmazonVPCFullAccess + AWSDirectConnectFullAccess Policies Security-Admins SecurityAudit Policy Server-Admins AmazonEC2FullAccess Policy Optional: Multiple Roles
  • 33. © 2015 Autodesk Optional: Multiple Roles, same account
  • 34. © 2015 Autodesk Optional: Two Factor Authentication
  • 35. © 2015 Autodesk  Create AD Security Groups  following naming convention  Create IAM Identity Provider  Create IAM Roles On-boarding New Accounts
  • 36. © 2015 Autodesk  AD security group membership  Role based access control Managing Access
  • 38. © 2015 Autodesk  Standardized authentication  Improved security  Convenient user experience  Flexible  Scalable to 100s+ accounts Benefits
  • 40. © 2015 Autodesk  IAM Keys Vending Machine  Access/Secret Key self service portal  Temporary, expires in 24 hours Next Steps
  • 41. © 2015 Autodesk  Using Identity Providers  http://goo.gl/qf7NpN  Using SAML Providers  http://goo.gl/cBMswu  IAM Federated User Access  http://goo.gl/5nIMt9 Documentation Resources
  • 43. Autodesk is a registered trademark of Autodesk, Inc., and/or its subsidiaries and/or affiliates in the USA and/or other countries. All other brand names, product names, or trademarks belong to their respective holders. Autodesk reserves the right to alter product and services offerings, and specifications and pricing at any time without notice, and is not responsible for typographical or graphical errors that may appear in this document. © 2015 Autodesk. All rights reserved.