SlideShare a Scribd company logo
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Quint Van Deman
Business Development Manager, Identity and Directory Services, Amazon Web Services
SID201
Overview of AWS Identity, Directory,
and Access Services
Every AWS Cloud journey is unique.
Migrating or extending
existing infrastructure
and applications.
Building customer facing
cloud-native
applications.
Going all-in on cloud
solutions across the
organization.
Using the scale of the
AWS Cloud to solve new
challenges.
Requiring unique identity and
access management solutions.
What to Expect
(C) Copyright Jean-Remy Duboc and licensed for reuse under the
Creative Commons Attribution-Generic 2.0 License
Provide
mental model
Chart the
landscape
Map to
use cases
Customer
examples
Disambiguation
IAM
Authentication, authorization,
audit, and governance for
your cloud workloads.
Our scope for today
AWS IAM
(the service)
Authenticates and authorizes
AWS APIs.
Includes
(the subject)
Identity and Access Management Means …
Validate identities
securely.
Authentication
Manage access using
fine-grained policies.
Authorization
Meet compliance
requirements.
Audit/Governance
At All Levels
Identity and Access Management
(the subject)
AWS Management Console/APIs
AWS infrastructure
AWS applications
Your applications
Developers
Admins
Security Employees
Customers
Partners
Mental Model
Tenets
Mental model for Identity and Access Management services
Give you choice Secure, flexible,
comprehensive
Meet you
where you are
Benefits of AWS Identity, Directory,
and Access Services
Superior Security
Enable you to build applications and manage access more
securely in the AWS Cloud than on premises.
Increase Flexibility
Offer you options that meet you along your AWS Cloud journey
instead of forcing you to adapt to AWS.
Comprehensive
Breadth of services that help you get started quickly and are
feature rich to meet your more advanced needs over time.
Landscape
AWS Identity, Directory,
and Access Services
AWS Identity and
Access
Management
Fine-grained access
management for
AWS resources.
AWS
Organizations
Policy-based
management for
multiple AWS
accounts.
Amazon Cognito
Identity and access
management for
your apps & APIs.
AWS Single Sign-On
Manage single sign-on
(SSO) access to
multiple AWS
accounts and
business applications.
AWS Directory
Service
Actual Microsoft
Active Directory as a
managed service on
the AWS Cloud.
Amazon Cloud
Directory
Directory for
managing
hierarchical data.
AWS Secrets
Manager (NEW!)
Lifecycle
management for
secrets.
Broader Security Portfolio
AWS Identity & Access
Management (IAM)
AWS Organizations
AWS Cognito
AWS SSO
AWS Directory Service
Amazon Cloud Directory
AWS Secrets Manager
AWS CloudTrail
AWS Config
Amazon
CloudWatch
Amazon GuardDuty
VPC Flow Logs
Amazon EC2
Systems Manager
AWS Shield
AWS Web Application
Firewall (AWS WAF)
Amazon Inspector
Amazon VPC (VPC)
AWS KMS
AWS CloudHSM
Amazon Macie
ACM
Server-Side Encryption
AWS Config Rules
AWS Lambda
Identity Detective
control
Infrastructure
security
Incident
response
Data
protection
Use Cases
Common Use Cases
Manage user access to AWS accounts and resources
• Developers signing in to the AWS Command Line Interface (AWS
CLI) or AWS Management Console.
• SecOps engineers running AWS Lambda functions.
Manage application access to data and resources
• Applications running on Amazon EC2 instances or containers that
need access to data in Amazon S3.
Manage user access to your own applications
• Users signing in to your applications using their Facebook, Twitter,
or Amazon accounts.
User Access to AWS Accounts & Resources
Enable users to sign in to AWS accounts using
their existing corporate credentials.
• Configure SSO access (federation) to each of
your AWS accounts using AWS IAM.
• AWS SSO helps you manage SSO access and
user permissions for multiple AWS accounts
centrally.
Define fine-grained user permissions within your
AWS accounts using IAM policies.
AWS Organizations helps you manage the use of
AWS service APIs across multiple AWS accounts.
AWS SSO: Define Permissions
Uses AWS Organizations to retrieve
your list and structure of accounts.
Master account
Member account #1 Member account #N
AWS OrganizationsAWS SSO
Define permissions using standard
syntax and tools.
Definitions and policies
automatically deployed and
maintained in member accounts.
AWS SSO: Assign Users
Master account
AWS OrganizationsAWS SSOAWS Directory
Service
Groups
Active Dir
EntitlementsDirectory connection
On-premises
Uses AWS Directory
Service to connect to
on-premises Active
Directory.
Map Active Directory
groups to defined
permissions.
Grant access to one
AWS account, an OU, or
the entire Organization.
AWS SSO: Login Flow
Master account
AWS SSO
AWS SSO
user portal
Groups
Active Dir
Users
Entitlements
AuthZ
On-premises
SAML
Member account
Users browse to the AWS
SSO user portal and are
authenticated using their
corporate credentials.
AWS SSO authorizes the user
based on their entitlements.
Actions and resource access
are governed by IAM policies
and Organizations SCPs.
Users are federated into an
IAM role in member account.
AWS Organizations: Key Concepts
A1 A2 A4
M
Master account / Administrative root
Organizational unit (OU)
AWS accounts
Service
Control
Policies
(SCPs)
AWS resources
A3
Dev Test Prod
AWS Organizations: Together with IAM
Allow: EC2:*Allow: S3:* Allow: SQS:*
Allow: EC2:*Allow: EC2:*
SCP IAM
permissions
Application Access to Data & Resources
Avoid hardcoding credentials in source code.
You can use IAM roles instead.
• AWS distributes and rotates short-term
credentials on your behalf automatically.
• IAM roles work with Amazon EC2, Amazon
EC2 containers, and AWS Lambda
functions.
You can define fine-grained permissions to
AWS resources using IAM policies.
AWS
resources
IAM Roles
Your code
Operating
system
EC2 instance
AWS credentials auto
delivered and rotated
AWS credentials auto
discovered and used
Access controlled by
policy attached to role
Also works with AWS Lambda & Amazon ECS
IAM roles provide your applications a reliable, secure,
auto-rotating solution for AWS credentials
But what about:
Database connection credentials?
Third-party API keys?
OAuth refresh tokens?
How do we avoid the back alley
exchange?
(C) Copyright A not very creative mind and licensed for reuse under
the Creative Commons Attribution-Generic 2.0 License
Lifecycle management for secrets such as database
credentials and API keys
Rotate Secrets
Safely
Pay as you goManage access
with fine-grained
policies
Secure and
audit secrets
centrally
Introducing AWS Secrets Manager
AWS Secrets Manager: Key Features
Safe rotation of
secrets
Built-in integrations,
extensible with
Lambda
On-demand or
automatic rotation
with versioning
Fine-grained access
policies
Encrypted storage Logging and
monitoring
AWS
resources
AWS Secrets Manger: Architecture
Your code
Operating
system
EC2 instance
Other
resources
AWS credentials
plumbed (as before)
DB creds
loaded
Safe
rotation
Combo provides your apps a reliable, secure, auto-rotating solution for ALL credentials
User Access to Your Own Applications
Enable users to bring their own identities
from social and enterprise identity providers
with Amazon Cognito.
• Built-in integrations for Facebook,
Google, and Amazon.
• Integrates with enterprise identity
providers that support OAuth 2.0, SAML
2.0, and OpenID Connect (OIDC).
Create cloud-native user directories with
extensible user profiles.
Secure access to your applications using
risk-based adaptive authentication (beta).
Amazon Cognito: Application IAM
Get AWS
credentials
Amazon Cognito
identity pool
Amazon
DynamoDB
Amazon S3
Access AWS services
Federating
IdP
Amazon Cognito
user poolUser pool authenticates users
and returns standard tokens
Amazon Cognito user pool
(CUP) tokens are used to
access your custom APIs
Identity pool provides role-
based AWS credentials to
access AWS services
Authenticate
3
CUP
token1
IdP
token
2
Redirect /
Post back
CUP
Token
5
6
Access serverless backendCUP
Token
API GW
4
Lambda
Amazon Cognito and API Gateway
Amazon Cognito
Identity management for your application
Amazon API Gateway
Authorize using your choice:
id token, access token, custom
Lambda microservices
AWS Lambda
Customer Examples
TIBCO
As TIBCO scaled on AWS, it wanted to
centrally manage permissions across multiple
AWS accounts.
TIBCO uses AWS Organizations service
control policies to manage service API use
across its AWS accounts.
Created Slack integration with Organizations to
enable users to deploy AWS infrastructure in
an auditable way.
AWS Organizations
Hixme
Provides employee benefits and insurance
solutions to businesses.
Hixme manages sensitive customer data,
requiring an authentication solution that
protects that information from unauthorized
access.
Use Amazon Cognito and AWS Lambda to
“develop a flexible, fully integrated solution that
can scale effortlessly.”
Amazon Cognito
user pools
Users with
mobile app
AWS Lambda
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Please complete the session survey in
the summit mobile app.
Submit Session Feedback
1. Tap the Schedule icon. 2. Select the session
you attended.
3. Tap Session
Evaluation to submit your
feedback.
Thank you!

More Related Content

What's hot

Develop Containerized Apps with AWS Fargate
Develop Containerized Apps with AWS Fargate Develop Containerized Apps with AWS Fargate
Develop Containerized Apps with AWS Fargate
Amazon Web Services
 
Workshop: Building Serverless Real-time Data Processing (Now with Unicorns!)
Workshop: Building Serverless Real-time Data Processing (Now with Unicorns!)Workshop: Building Serverless Real-time Data Processing (Now with Unicorns!)
Workshop: Building Serverless Real-time Data Processing (Now with Unicorns!)
Amazon Web Services
 
ENT304 Enabling Self Service for Data Scientists with AWS Service Catalog
ENT304 Enabling Self Service for Data Scientists with AWS Service CatalogENT304 Enabling Self Service for Data Scientists with AWS Service Catalog
ENT304 Enabling Self Service for Data Scientists with AWS Service Catalog
Amazon Web Services
 
Bridgewater's Model-Based Verification of AWS Security Controls
Bridgewater's Model-Based Verification of AWS Security Controls Bridgewater's Model-Based Verification of AWS Security Controls
Bridgewater's Model-Based Verification of AWS Security Controls
Amazon Web Services
 
Amazon S3_Updates and Best Practices
Amazon S3_Updates and Best Practices Amazon S3_Updates and Best Practices
Amazon S3_Updates and Best Practices
Amazon Web Services
 
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech TalksDeep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
Amazon Web Services
 
Design, Deploy, & Optimize SQL Server Workloads
Design, Deploy, & Optimize SQL Server Workloads Design, Deploy, & Optimize SQL Server Workloads
Design, Deploy, & Optimize SQL Server Workloads
Amazon Web Services
 
DEM04 Fearless: From Monolith to Serverless with Dynatrace
DEM04 Fearless: From Monolith to Serverless with DynatraceDEM04 Fearless: From Monolith to Serverless with Dynatrace
DEM04 Fearless: From Monolith to Serverless with Dynatrace
Amazon Web Services
 
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...
Amazon Web Services
 
SRV327 Replicate, Analyze, and Visualize Data Using Managed Database and Ser...
 SRV327 Replicate, Analyze, and Visualize Data Using Managed Database and Ser... SRV327 Replicate, Analyze, and Visualize Data Using Managed Database and Ser...
SRV327 Replicate, Analyze, and Visualize Data Using Managed Database and Ser...
Amazon Web Services
 
Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...
Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...
Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...
Amazon Web Services
 
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
Amazon Web Services
 
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
Amazon Web Services
 
Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS
Amazon Web Services
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
Amazon Web Services
 
Secure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneSecure Your Customers' Data From Day One
Secure Your Customers' Data From Day One
Amazon Web Services
 
DEM17 Eon Mode: Separating Compute from Storage for Dynamic Scaling
DEM17 Eon Mode: Separating Compute from Storage for Dynamic ScalingDEM17 Eon Mode: Separating Compute from Storage for Dynamic Scaling
DEM17 Eon Mode: Separating Compute from Storage for Dynamic Scaling
Amazon Web Services
 
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
Amazon Web Services
 
Setting Up a Landing Zone
Setting Up a Landing ZoneSetting Up a Landing Zone
Setting Up a Landing Zone
Amazon Web Services
 
How to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech Talks
How to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech TalksHow to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech Talks
How to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech Talks
Amazon Web Services
 

What's hot (20)

Develop Containerized Apps with AWS Fargate
Develop Containerized Apps with AWS Fargate Develop Containerized Apps with AWS Fargate
Develop Containerized Apps with AWS Fargate
 
Workshop: Building Serverless Real-time Data Processing (Now with Unicorns!)
Workshop: Building Serverless Real-time Data Processing (Now with Unicorns!)Workshop: Building Serverless Real-time Data Processing (Now with Unicorns!)
Workshop: Building Serverless Real-time Data Processing (Now with Unicorns!)
 
ENT304 Enabling Self Service for Data Scientists with AWS Service Catalog
ENT304 Enabling Self Service for Data Scientists with AWS Service CatalogENT304 Enabling Self Service for Data Scientists with AWS Service Catalog
ENT304 Enabling Self Service for Data Scientists with AWS Service Catalog
 
Bridgewater's Model-Based Verification of AWS Security Controls
Bridgewater's Model-Based Verification of AWS Security Controls Bridgewater's Model-Based Verification of AWS Security Controls
Bridgewater's Model-Based Verification of AWS Security Controls
 
Amazon S3_Updates and Best Practices
Amazon S3_Updates and Best Practices Amazon S3_Updates and Best Practices
Amazon S3_Updates and Best Practices
 
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech TalksDeep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
 
Design, Deploy, & Optimize SQL Server Workloads
Design, Deploy, & Optimize SQL Server Workloads Design, Deploy, & Optimize SQL Server Workloads
Design, Deploy, & Optimize SQL Server Workloads
 
DEM04 Fearless: From Monolith to Serverless with Dynatrace
DEM04 Fearless: From Monolith to Serverless with DynatraceDEM04 Fearless: From Monolith to Serverless with Dynatrace
DEM04 Fearless: From Monolith to Serverless with Dynatrace
 
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...
DEM08 Use Cisco Cloud Connect to Securely Extend Private Network to AWS and M...
 
SRV327 Replicate, Analyze, and Visualize Data Using Managed Database and Ser...
 SRV327 Replicate, Analyze, and Visualize Data Using Managed Database and Ser... SRV327 Replicate, Analyze, and Visualize Data Using Managed Database and Ser...
SRV327 Replicate, Analyze, and Visualize Data Using Managed Database and Ser...
 
Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...
Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...
Architecting ASP.NET Core Microservices Applications on AWS (WIN401) - AWS re...
 
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
 
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
 
Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
Secure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneSecure Your Customers' Data From Day One
Secure Your Customers' Data From Day One
 
DEM17 Eon Mode: Separating Compute from Storage for Dynamic Scaling
DEM17 Eon Mode: Separating Compute from Storage for Dynamic ScalingDEM17 Eon Mode: Separating Compute from Storage for Dynamic Scaling
DEM17 Eon Mode: Separating Compute from Storage for Dynamic Scaling
 
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
Set Up a CI/CD Pipeline for Deploying Containers Using the AWS Developer Tool...
 
Setting Up a Landing Zone
Setting Up a Landing ZoneSetting Up a Landing Zone
Setting Up a Landing Zone
 
How to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech Talks
How to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech TalksHow to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech Talks
How to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech Talks
 

Similar to SID201 Overview of AWS Identity, Directory, and Access Services

AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
Amazon Web Services
 
How You Can Use AWS Identity Services to Be Successful on Your AWS Cloud Journey
How You Can Use AWS Identity Services to Be Successful on Your AWS Cloud JourneyHow You Can Use AWS Identity Services to Be Successful on Your AWS Cloud Journey
How You Can Use AWS Identity Services to Be Successful on Your AWS Cloud Journey
Amazon Web Services
 
Demystifying identity on AWS
Demystifying identity on AWSDemystifying identity on AWS
Demystifying identity on AWS
AWS User Group Bengaluru
 
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-OnAWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
Amazon Web Services
 
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Amazon Web Services
 
Cloud Security-how to create serverless applications
Cloud Security-how to create serverless applicationsCloud Security-how to create serverless applications
Cloud Security-how to create serverless applications
Amazon Web Services
 
Security Best Practices for Serverless Applications - July 2017 AWS Online T...
Security Best Practices for Serverless Applications  - July 2017 AWS Online T...Security Best Practices for Serverless Applications  - July 2017 AWS Online T...
Security Best Practices for Serverless Applications - July 2017 AWS Online T...
Amazon Web Services
 
Simplify & Standardise Your Migration to AWS with a Migration Landing Zone
Simplify & Standardise Your Migration to AWS with a Migration Landing ZoneSimplify & Standardise Your Migration to AWS with a Migration Landing Zone
Simplify & Standardise Your Migration to AWS with a Migration Landing Zone
Amazon Web Services
 
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
Amazon Web Services
 
AWS Identity and access management for users
AWS Identity and access management for usersAWS Identity and access management for users
AWS Identity and access management for users
StephenEfange3
 
What's New in AWS Security Features
What's New in AWS Security FeaturesWhat's New in AWS Security Features
What's New in AWS Security FeaturesAmazon Web Services
 
Security Best Practices - Hebrew Webinar
Security Best Practices - Hebrew WebinarSecurity Best Practices - Hebrew Webinar
Security Best Practices - Hebrew Webinar
Amazon Web Services
 
AWSome Day Online 2020_Module 4: Secure your cloud applications
AWSome Day Online 2020_Module 4: Secure your cloud applicationsAWSome Day Online 2020_Module 4: Secure your cloud applications
AWSome Day Online 2020_Module 4: Secure your cloud applications
Amazon Web Services
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Amazon Web Services
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Amazon Web Services
 
Deep Dive on Amazon Cognito - DevDay Austin 2017
Deep Dive on Amazon Cognito - DevDay Austin 2017Deep Dive on Amazon Cognito - DevDay Austin 2017
Deep Dive on Amazon Cognito - DevDay Austin 2017Amazon Web Services
 
Security & Compliance for Modern Serverless Applications (SRV319-R1) - AWS re...
Security & Compliance for Modern Serverless Applications (SRV319-R1) - AWS re...Security & Compliance for Modern Serverless Applications (SRV319-R1) - AWS re...
Security & Compliance for Modern Serverless Applications (SRV319-R1) - AWS re...
Amazon Web Services
 
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdfJeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jean-François LOMBARDO
 
Amazon Cognito Deep Dive
Amazon Cognito Deep DiveAmazon Cognito Deep Dive
Amazon Cognito Deep Dive
Amazon Web Services
 
Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...
Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...
Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...
Amazon Web Services
 

Similar to SID201 Overview of AWS Identity, Directory, and Access Services (20)

AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
 
How You Can Use AWS Identity Services to Be Successful on Your AWS Cloud Journey
How You Can Use AWS Identity Services to Be Successful on Your AWS Cloud JourneyHow You Can Use AWS Identity Services to Be Successful on Your AWS Cloud Journey
How You Can Use AWS Identity Services to Be Successful on Your AWS Cloud Journey
 
Demystifying identity on AWS
Demystifying identity on AWSDemystifying identity on AWS
Demystifying identity on AWS
 
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-OnAWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
 
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
 
Cloud Security-how to create serverless applications
Cloud Security-how to create serverless applicationsCloud Security-how to create serverless applications
Cloud Security-how to create serverless applications
 
Security Best Practices for Serverless Applications - July 2017 AWS Online T...
Security Best Practices for Serverless Applications  - July 2017 AWS Online T...Security Best Practices for Serverless Applications  - July 2017 AWS Online T...
Security Best Practices for Serverless Applications - July 2017 AWS Online T...
 
Simplify & Standardise Your Migration to AWS with a Migration Landing Zone
Simplify & Standardise Your Migration to AWS with a Migration Landing ZoneSimplify & Standardise Your Migration to AWS with a Migration Landing Zone
Simplify & Standardise Your Migration to AWS with a Migration Landing Zone
 
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
 
AWS Identity and access management for users
AWS Identity and access management for usersAWS Identity and access management for users
AWS Identity and access management for users
 
What's New in AWS Security Features
What's New in AWS Security FeaturesWhat's New in AWS Security Features
What's New in AWS Security Features
 
Security Best Practices - Hebrew Webinar
Security Best Practices - Hebrew WebinarSecurity Best Practices - Hebrew Webinar
Security Best Practices - Hebrew Webinar
 
AWSome Day Online 2020_Module 4: Secure your cloud applications
AWSome Day Online 2020_Module 4: Secure your cloud applicationsAWSome Day Online 2020_Module 4: Secure your cloud applications
AWSome Day Online 2020_Module 4: Secure your cloud applications
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
 
Deep Dive on Amazon Cognito - DevDay Austin 2017
Deep Dive on Amazon Cognito - DevDay Austin 2017Deep Dive on Amazon Cognito - DevDay Austin 2017
Deep Dive on Amazon Cognito - DevDay Austin 2017
 
Security & Compliance for Modern Serverless Applications (SRV319-R1) - AWS re...
Security & Compliance for Modern Serverless Applications (SRV319-R1) - AWS re...Security & Compliance for Modern Serverless Applications (SRV319-R1) - AWS re...
Security & Compliance for Modern Serverless Applications (SRV319-R1) - AWS re...
 
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdfJeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
 
Amazon Cognito Deep Dive
Amazon Cognito Deep DiveAmazon Cognito Deep Dive
Amazon Cognito Deep Dive
 
Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...
Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...
Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
Amazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

SID201 Overview of AWS Identity, Directory, and Access Services

  • 1. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Quint Van Deman Business Development Manager, Identity and Directory Services, Amazon Web Services SID201 Overview of AWS Identity, Directory, and Access Services
  • 2. Every AWS Cloud journey is unique. Migrating or extending existing infrastructure and applications. Building customer facing cloud-native applications. Going all-in on cloud solutions across the organization. Using the scale of the AWS Cloud to solve new challenges. Requiring unique identity and access management solutions.
  • 3. What to Expect (C) Copyright Jean-Remy Duboc and licensed for reuse under the Creative Commons Attribution-Generic 2.0 License Provide mental model Chart the landscape Map to use cases Customer examples
  • 4. Disambiguation IAM Authentication, authorization, audit, and governance for your cloud workloads. Our scope for today AWS IAM (the service) Authenticates and authorizes AWS APIs. Includes (the subject)
  • 5. Identity and Access Management Means … Validate identities securely. Authentication Manage access using fine-grained policies. Authorization Meet compliance requirements. Audit/Governance
  • 6. At All Levels Identity and Access Management (the subject) AWS Management Console/APIs AWS infrastructure AWS applications Your applications Developers Admins Security Employees Customers Partners
  • 8. Tenets Mental model for Identity and Access Management services Give you choice Secure, flexible, comprehensive Meet you where you are
  • 9. Benefits of AWS Identity, Directory, and Access Services Superior Security Enable you to build applications and manage access more securely in the AWS Cloud than on premises. Increase Flexibility Offer you options that meet you along your AWS Cloud journey instead of forcing you to adapt to AWS. Comprehensive Breadth of services that help you get started quickly and are feature rich to meet your more advanced needs over time.
  • 11. AWS Identity, Directory, and Access Services AWS Identity and Access Management Fine-grained access management for AWS resources. AWS Organizations Policy-based management for multiple AWS accounts. Amazon Cognito Identity and access management for your apps & APIs. AWS Single Sign-On Manage single sign-on (SSO) access to multiple AWS accounts and business applications. AWS Directory Service Actual Microsoft Active Directory as a managed service on the AWS Cloud. Amazon Cloud Directory Directory for managing hierarchical data. AWS Secrets Manager (NEW!) Lifecycle management for secrets.
  • 12. Broader Security Portfolio AWS Identity & Access Management (IAM) AWS Organizations AWS Cognito AWS SSO AWS Directory Service Amazon Cloud Directory AWS Secrets Manager AWS CloudTrail AWS Config Amazon CloudWatch Amazon GuardDuty VPC Flow Logs Amazon EC2 Systems Manager AWS Shield AWS Web Application Firewall (AWS WAF) Amazon Inspector Amazon VPC (VPC) AWS KMS AWS CloudHSM Amazon Macie ACM Server-Side Encryption AWS Config Rules AWS Lambda Identity Detective control Infrastructure security Incident response Data protection
  • 14. Common Use Cases Manage user access to AWS accounts and resources • Developers signing in to the AWS Command Line Interface (AWS CLI) or AWS Management Console. • SecOps engineers running AWS Lambda functions. Manage application access to data and resources • Applications running on Amazon EC2 instances or containers that need access to data in Amazon S3. Manage user access to your own applications • Users signing in to your applications using their Facebook, Twitter, or Amazon accounts.
  • 15. User Access to AWS Accounts & Resources Enable users to sign in to AWS accounts using their existing corporate credentials. • Configure SSO access (federation) to each of your AWS accounts using AWS IAM. • AWS SSO helps you manage SSO access and user permissions for multiple AWS accounts centrally. Define fine-grained user permissions within your AWS accounts using IAM policies. AWS Organizations helps you manage the use of AWS service APIs across multiple AWS accounts.
  • 16. AWS SSO: Define Permissions Uses AWS Organizations to retrieve your list and structure of accounts. Master account Member account #1 Member account #N AWS OrganizationsAWS SSO Define permissions using standard syntax and tools. Definitions and policies automatically deployed and maintained in member accounts.
  • 17. AWS SSO: Assign Users Master account AWS OrganizationsAWS SSOAWS Directory Service Groups Active Dir EntitlementsDirectory connection On-premises Uses AWS Directory Service to connect to on-premises Active Directory. Map Active Directory groups to defined permissions. Grant access to one AWS account, an OU, or the entire Organization.
  • 18. AWS SSO: Login Flow Master account AWS SSO AWS SSO user portal Groups Active Dir Users Entitlements AuthZ On-premises SAML Member account Users browse to the AWS SSO user portal and are authenticated using their corporate credentials. AWS SSO authorizes the user based on their entitlements. Actions and resource access are governed by IAM policies and Organizations SCPs. Users are federated into an IAM role in member account.
  • 19. AWS Organizations: Key Concepts A1 A2 A4 M Master account / Administrative root Organizational unit (OU) AWS accounts Service Control Policies (SCPs) AWS resources A3 Dev Test Prod
  • 20. AWS Organizations: Together with IAM Allow: EC2:*Allow: S3:* Allow: SQS:* Allow: EC2:*Allow: EC2:* SCP IAM permissions
  • 21. Application Access to Data & Resources Avoid hardcoding credentials in source code. You can use IAM roles instead. • AWS distributes and rotates short-term credentials on your behalf automatically. • IAM roles work with Amazon EC2, Amazon EC2 containers, and AWS Lambda functions. You can define fine-grained permissions to AWS resources using IAM policies.
  • 22. AWS resources IAM Roles Your code Operating system EC2 instance AWS credentials auto delivered and rotated AWS credentials auto discovered and used Access controlled by policy attached to role Also works with AWS Lambda & Amazon ECS
  • 23. IAM roles provide your applications a reliable, secure, auto-rotating solution for AWS credentials But what about: Database connection credentials? Third-party API keys? OAuth refresh tokens? How do we avoid the back alley exchange? (C) Copyright A not very creative mind and licensed for reuse under the Creative Commons Attribution-Generic 2.0 License
  • 24. Lifecycle management for secrets such as database credentials and API keys Rotate Secrets Safely Pay as you goManage access with fine-grained policies Secure and audit secrets centrally Introducing AWS Secrets Manager
  • 25. AWS Secrets Manager: Key Features Safe rotation of secrets Built-in integrations, extensible with Lambda On-demand or automatic rotation with versioning Fine-grained access policies Encrypted storage Logging and monitoring
  • 26. AWS resources AWS Secrets Manger: Architecture Your code Operating system EC2 instance Other resources AWS credentials plumbed (as before) DB creds loaded Safe rotation Combo provides your apps a reliable, secure, auto-rotating solution for ALL credentials
  • 27. User Access to Your Own Applications Enable users to bring their own identities from social and enterprise identity providers with Amazon Cognito. • Built-in integrations for Facebook, Google, and Amazon. • Integrates with enterprise identity providers that support OAuth 2.0, SAML 2.0, and OpenID Connect (OIDC). Create cloud-native user directories with extensible user profiles. Secure access to your applications using risk-based adaptive authentication (beta).
  • 28. Amazon Cognito: Application IAM Get AWS credentials Amazon Cognito identity pool Amazon DynamoDB Amazon S3 Access AWS services Federating IdP Amazon Cognito user poolUser pool authenticates users and returns standard tokens Amazon Cognito user pool (CUP) tokens are used to access your custom APIs Identity pool provides role- based AWS credentials to access AWS services Authenticate 3 CUP token1 IdP token 2 Redirect / Post back CUP Token 5 6 Access serverless backendCUP Token API GW 4 Lambda
  • 29. Amazon Cognito and API Gateway Amazon Cognito Identity management for your application Amazon API Gateway Authorize using your choice: id token, access token, custom Lambda microservices AWS Lambda
  • 31. TIBCO As TIBCO scaled on AWS, it wanted to centrally manage permissions across multiple AWS accounts. TIBCO uses AWS Organizations service control policies to manage service API use across its AWS accounts. Created Slack integration with Organizations to enable users to deploy AWS infrastructure in an auditable way. AWS Organizations
  • 32. Hixme Provides employee benefits and insurance solutions to businesses. Hixme manages sensitive customer data, requiring an authentication solution that protects that information from unauthorized access. Use Amazon Cognito and AWS Lambda to “develop a flexible, fully integrated solution that can scale effortlessly.” Amazon Cognito user pools Users with mobile app AWS Lambda
  • 33. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Please complete the session survey in the summit mobile app.
  • 34. Submit Session Feedback 1. Tap the Schedule icon. 2. Select the session you attended. 3. Tap Session Evaluation to submit your feedback.