AWS Identity

@AWSIdentity

The tweet feed for AWS Identity and Access Management (IAM) and AWS Directory Service. See & .

Seattle, WA, USA
Vrijeme pridruživanja: rujan 2012.

Tweetovi

Blokirali ste korisnika/cu @AWSIdentity

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @AWSIdentity

  1. prije 9 sati

    Want to give your users access to AWS in just a few clicks? Join our Tech Talk, "How to Use Azure AD with AWS Single Sign-On" on Feb 25, 9am PT. Learn how to configure & manage access centrally to multiple AWS accounts, roles, & business apps.

    Poništi
  2. 27. sij

    Developers can now use policy simulator to debug issues related to permission boundary policies:

    Poništi
  3. 24. sij

    New! 🚀 policy simulator adds support for permissions boundary policies. Administrators can now better understand how permissions boundary policies affect effective permissions of their developers:

    Poništi
  4. 20. sij

    New! 🚀 AWS Health enables aggregation of health events across AWS Organizations

    Poništi
  5. proslijedio/la je Tweet

    Curious about the difference between role-based & attribute-based access? Dive deep with Yuri Duchovny & Eran Medan to learn about these concepts & see how they work in :

    Poništi
  6. proslijedio/la je Tweet

    Want to know how to take advantage of AWS Control Tower and CloudEndure to expedite your migration? See how we can help!

    Poništi
  7. 15. sij

    New! Amazon Elastic File System now supports for Network File System clients. You can use IAM roles to identify NFS clients with cryptographic security & use IAM policies to manage client-specific permissions:

    Poništi
  8. proslijedio/la je Tweet

    New year, new Tech Talks! Kick off 2020 with interactive sessions hosted by AWS experts. Our AWS Online Tech Talks schedule for January is available now.

    Poništi
  9. proslijedio/la je Tweet

    Learn about IAM session tags & how you can simplify fine-grained access to resources with :

    Poništi
  10. proslijedio/la je Tweet

    Security has become everyone’s job. In this eBook, AWS Enterprise Strategist Mark Schwartz shares a proven set of norms & practices to keep your enterprise secure.

    Poništi
  11. 13. sij

    Managing least privilege access control is essential. This tech talk with Yuri Duchovny & Eran Medan will explore how to approach that with Attribute Based Access Control (ABAC) model in AWS. The registration is open:

    Poništi
  12. proslijedio/la je Tweet
    6. sij

    Multi-Tenant AWS Amplify: Method 1: Cognito Custom Attributes by

    Poništi
  13. proslijedio/la je Tweet

    Do you know that employees' access permissions can get automatically updated in AWS when you update their attributes in your corporate directory?

    Poništi
  14. 31. pro 2019.

    Our inaugural AWS Identity Day is coming to NYC on January 23! It is an opportunity to engage directly with the AWS Identity experts & deep dive into the details of how to use our services. The event is free & open to all AWS customers, space is limited:

    Poništi
  15. proslijedio/la je Tweet

    Didn't get a chance to attend re:Invent this year? Here is a list of the Management & Governance breakout session videos to hold you over to next year.

    Poništi
  16. proslijedio/la je Tweet

    Identify unused AWS IAM roles easily & remove them confidently by using the last activity timestamp.

    Poništi
  17. proslijedio/la je Tweet

    Just getting started with AWS & want to do security, , & authorization right? Our Senior Principal Engineer Becky Weiss will get you up to speed quickly in this highly practical 2019 session! Available on YouTube:

    Poništi
  18. proslijedio/la je Tweet
    24. pro 2019.

    You can use AWS Identity and Access Management (IAM) to restrict Amazon DynamoDB backup and restore actions for some resources. You can use these example IAM policies to configure specific backup and restore functionality in DynamoDB:

    Poništi
  19. proslijedio/la je Tweet
    24. pro 2019.

    These Amazon DynamoDB security best practices can help you detect potential security weaknesses & incidents:

    Poništi
  20. proslijedio/la je Tweet
    23. pro 2019.

    If you are writing an application targeted at large numbers of users, you can use web identity federation for authentication & authorization. Web identity federation removes the need for creating individual AWS IAM users.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·