Implementing identity management on AWS: a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments
Understand the IAM toolsets, capabilities, and paradigms of the AWS platform and learn how to apply practical identity use cases to AWS at the administrative and application level Key Features Learn administrative lifecycle management and authorization Extend workforce identity to AWS for applicatio...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham
Packt Publishing
2021
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781800562288/?ar |
Zusammenfassung: | Understand the IAM toolsets, capabilities, and paradigms of the AWS platform and learn how to apply practical identity use cases to AWS at the administrative and application level Key Features Learn administrative lifecycle management and authorization Extend workforce identity to AWS for applications deployed to Amazon Web Services (AWS) Understand how to use native AWS IAM capabilities with apps deployed to AWS Book DescriptionAWS identity management offers a powerful yet complex array of native capabilities and connections to existing enterprise identity systems for administrative and application identity use cases. This book breaks down the complexities involved by adopting a use-case-driven approach that helps identity and cloud engineers understand how to use the right mix of native AWS capabilities and external IAM components to achieve the business and security outcomes they want. You will begin by learning about the IAM toolsets and paradigms within AWS. This will allow you to determine how to best leverage them for administrative control, extending workforce identities to the cloud, and using IAM toolsets and paradigms on an app deployed on AWS. Next, the book demonstrates how to extend your on-premise administrative IAM capabilities to the AWS backplane, as well as how to make your workforce identities available for AWS-deployed applications. In the concluding chapters, you'll learn how to use the native identity services with applications deployed on AWS. By the end of this IAM Amazon Web Services book, you will be able to build enterprise-class solutions for administrative and application identity using AWS IAM tools and external identity systems. What you will learn Understand AWS IAM concepts, terminology, and services Explore AWS IAM, Amazon Cognito, AWS SSO, and AWS Directory Service to solve customer and workforce identity problems Apply the concepts you learn about to solve business, process, and compliance challenges when expanding into AWS Navigate the AWS CLI to unlock the programmatic administration of AWS Explore how AWS IAM, its policy objects, and notational language can be applied to solve security and access management use cases Relate concepts easily to your own environment through IAM patterns and best practices Who this book is for Identity engineers and administrators, cloud administrators, security architects, or anyone who wants to explore and manage IAM solutions in AWS will find this book useful. Basic knowledge of AWS cloud infrastructure and services is required to understand the concepts covered in the book more effectively. |
Beschreibung: | Description based on CIP data; resource not viewed |
Umfang: | 1 Online-Ressource |
ISBN: | 9781800567023 1800567022 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-068520433 | ||
003 | DE-627-1 | ||
005 | 20240228121434.0 | ||
007 | cr uuu---uuuuu | ||
008 | 211006s2021 xx |||||o 00| ||eng c | ||
020 | |a 9781800567023 |c ebook |9 978-1-80056-702-3 | ||
020 | |a 1800567022 |9 1-80056-702-2 | ||
035 | |a (DE-627-1)068520433 | ||
035 | |a (DE-599)KEP068520433 | ||
035 | |a (ORHE)9781800562288 | ||
035 | |a (DE-627-1)068520433 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Lehtinen, Jon |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Implementing identity management on AWS |b a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments |c Jon Lehtinen, Steve Hutchinson |
264 | 1 | |a Birmingham |b Packt Publishing |c 2021 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Description based on CIP data; resource not viewed | ||
520 | |a Understand the IAM toolsets, capabilities, and paradigms of the AWS platform and learn how to apply practical identity use cases to AWS at the administrative and application level Key Features Learn administrative lifecycle management and authorization Extend workforce identity to AWS for applications deployed to Amazon Web Services (AWS) Understand how to use native AWS IAM capabilities with apps deployed to AWS Book DescriptionAWS identity management offers a powerful yet complex array of native capabilities and connections to existing enterprise identity systems for administrative and application identity use cases. This book breaks down the complexities involved by adopting a use-case-driven approach that helps identity and cloud engineers understand how to use the right mix of native AWS capabilities and external IAM components to achieve the business and security outcomes they want. You will begin by learning about the IAM toolsets and paradigms within AWS. This will allow you to determine how to best leverage them for administrative control, extending workforce identities to the cloud, and using IAM toolsets and paradigms on an app deployed on AWS. Next, the book demonstrates how to extend your on-premise administrative IAM capabilities to the AWS backplane, as well as how to make your workforce identities available for AWS-deployed applications. In the concluding chapters, you'll learn how to use the native identity services with applications deployed on AWS. By the end of this IAM Amazon Web Services book, you will be able to build enterprise-class solutions for administrative and application identity using AWS IAM tools and external identity systems. What you will learn Understand AWS IAM concepts, terminology, and services Explore AWS IAM, Amazon Cognito, AWS SSO, and AWS Directory Service to solve customer and workforce identity problems Apply the concepts you learn about to solve business, process, and compliance challenges when expanding into AWS Navigate the AWS CLI to unlock the programmatic administration of AWS Explore how AWS IAM, its policy objects, and notational language can be applied to solve security and access management use cases Relate concepts easily to your own environment through IAM patterns and best practices Who this book is for Identity engineers and administrators, cloud administrators, security architects, or anyone who wants to explore and manage IAM solutions in AWS will find this book useful. Basic knowledge of AWS cloud infrastructure and services is required to understand the concepts covered in the book more effectively. | ||
610 | 1 | 0 | |a Amazon Web Services (Firm) |
650 | 0 | |a Computer networks |x Access control | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Amazon Web Services (Firm) | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer networks ; Access control | |
650 | 4 | |a Computer security | |
700 | 1 | |a Hutchinson, Steve |e VerfasserIn |4 aut | |
776 | 1 | |z 9781800562288 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781800562288 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781800562288/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-068520433 |
---|---|
_version_ | 1821494830594785280 |
adam_text | |
any_adam_object | |
author | Lehtinen, Jon Hutchinson, Steve |
author_facet | Lehtinen, Jon Hutchinson, Steve |
author_role | aut aut |
author_sort | Lehtinen, Jon |
author_variant | j l jl s h sh |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)068520433 (DE-599)KEP068520433 (ORHE)9781800562288 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04320cam a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-068520433</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121434.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">211006s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781800567023</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-80056-702-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1800567022</subfield><subfield code="9">1-80056-702-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)068520433</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP068520433</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781800562288</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)068520433</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lehtinen, Jon</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Implementing identity management on AWS</subfield><subfield code="b">a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments</subfield><subfield code="c">Jon Lehtinen, Steve Hutchinson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on CIP data; resource not viewed</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Understand the IAM toolsets, capabilities, and paradigms of the AWS platform and learn how to apply practical identity use cases to AWS at the administrative and application level Key Features Learn administrative lifecycle management and authorization Extend workforce identity to AWS for applications deployed to Amazon Web Services (AWS) Understand how to use native AWS IAM capabilities with apps deployed to AWS Book DescriptionAWS identity management offers a powerful yet complex array of native capabilities and connections to existing enterprise identity systems for administrative and application identity use cases. This book breaks down the complexities involved by adopting a use-case-driven approach that helps identity and cloud engineers understand how to use the right mix of native AWS capabilities and external IAM components to achieve the business and security outcomes they want. You will begin by learning about the IAM toolsets and paradigms within AWS. This will allow you to determine how to best leverage them for administrative control, extending workforce identities to the cloud, and using IAM toolsets and paradigms on an app deployed on AWS. Next, the book demonstrates how to extend your on-premise administrative IAM capabilities to the AWS backplane, as well as how to make your workforce identities available for AWS-deployed applications. In the concluding chapters, you'll learn how to use the native identity services with applications deployed on AWS. By the end of this IAM Amazon Web Services book, you will be able to build enterprise-class solutions for administrative and application identity using AWS IAM tools and external identity systems. What you will learn Understand AWS IAM concepts, terminology, and services Explore AWS IAM, Amazon Cognito, AWS SSO, and AWS Directory Service to solve customer and workforce identity problems Apply the concepts you learn about to solve business, process, and compliance challenges when expanding into AWS Navigate the AWS CLI to unlock the programmatic administration of AWS Explore how AWS IAM, its policy objects, and notational language can be applied to solve security and access management use cases Relate concepts easily to your own environment through IAM patterns and best practices Who this book is for Identity engineers and administrators, cloud administrators, security architects, or anyone who wants to explore and manage IAM solutions in AWS will find this book useful. Basic knowledge of AWS cloud infrastructure and services is required to understand the concepts covered in the book more effectively.</subfield></datafield><datafield tag="610" ind1="1" ind2="0"><subfield code="a">Amazon Web Services (Firm)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Amazon Web Services (Firm)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hutchinson, Steve</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781800562288</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781800562288</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781800562288/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-068520433 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:37Z |
institution | BVB |
isbn | 9781800567023 1800567022 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Packt Publishing |
record_format | marc |
spelling | Lehtinen, Jon VerfasserIn aut Implementing identity management on AWS a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments Jon Lehtinen, Steve Hutchinson Birmingham Packt Publishing 2021 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Description based on CIP data; resource not viewed Understand the IAM toolsets, capabilities, and paradigms of the AWS platform and learn how to apply practical identity use cases to AWS at the administrative and application level Key Features Learn administrative lifecycle management and authorization Extend workforce identity to AWS for applications deployed to Amazon Web Services (AWS) Understand how to use native AWS IAM capabilities with apps deployed to AWS Book DescriptionAWS identity management offers a powerful yet complex array of native capabilities and connections to existing enterprise identity systems for administrative and application identity use cases. This book breaks down the complexities involved by adopting a use-case-driven approach that helps identity and cloud engineers understand how to use the right mix of native AWS capabilities and external IAM components to achieve the business and security outcomes they want. You will begin by learning about the IAM toolsets and paradigms within AWS. This will allow you to determine how to best leverage them for administrative control, extending workforce identities to the cloud, and using IAM toolsets and paradigms on an app deployed on AWS. Next, the book demonstrates how to extend your on-premise administrative IAM capabilities to the AWS backplane, as well as how to make your workforce identities available for AWS-deployed applications. In the concluding chapters, you'll learn how to use the native identity services with applications deployed on AWS. By the end of this IAM Amazon Web Services book, you will be able to build enterprise-class solutions for administrative and application identity using AWS IAM tools and external identity systems. What you will learn Understand AWS IAM concepts, terminology, and services Explore AWS IAM, Amazon Cognito, AWS SSO, and AWS Directory Service to solve customer and workforce identity problems Apply the concepts you learn about to solve business, process, and compliance challenges when expanding into AWS Navigate the AWS CLI to unlock the programmatic administration of AWS Explore how AWS IAM, its policy objects, and notational language can be applied to solve security and access management use cases Relate concepts easily to your own environment through IAM patterns and best practices Who this book is for Identity engineers and administrators, cloud administrators, security architects, or anyone who wants to explore and manage IAM solutions in AWS will find this book useful. Basic knowledge of AWS cloud infrastructure and services is required to understand the concepts covered in the book more effectively. Amazon Web Services (Firm) Computer networks Access control Computer security Computer Security Sécurité informatique Computer networks ; Access control Hutchinson, Steve VerfasserIn aut 9781800562288 Erscheint auch als Druck-Ausgabe 9781800562288 |
spellingShingle | Lehtinen, Jon Hutchinson, Steve Implementing identity management on AWS a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments Amazon Web Services (Firm) Computer networks Access control Computer security Computer Security Sécurité informatique Computer networks ; Access control |
title | Implementing identity management on AWS a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments |
title_auth | Implementing identity management on AWS a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments |
title_exact_search | Implementing identity management on AWS a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments |
title_full | Implementing identity management on AWS a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments Jon Lehtinen, Steve Hutchinson |
title_fullStr | Implementing identity management on AWS a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments Jon Lehtinen, Steve Hutchinson |
title_full_unstemmed | Implementing identity management on AWS a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments Jon Lehtinen, Steve Hutchinson |
title_short | Implementing identity management on AWS |
title_sort | implementing identity management on aws a real world guide to solving customer and workforce iam challenges in your aws cloud environments |
title_sub | a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments |
topic | Amazon Web Services (Firm) Computer networks Access control Computer security Computer Security Sécurité informatique Computer networks ; Access control |
topic_facet | Amazon Web Services (Firm) Computer networks Access control Computer security Computer Security Sécurité informatique Computer networks ; Access control |
work_keys_str_mv | AT lehtinenjon implementingidentitymanagementonawsarealworldguidetosolvingcustomerandworkforceiamchallengesinyourawscloudenvironments AT hutchinsonsteve implementingidentitymanagementonawsarealworldguidetosolvingcustomerandworkforceiamchallengesinyourawscloudenvironments |