Post

AWS - IdenAccessManage - IAM User Login


IAM User Login


The following diagram shows the different methods of authentication available with IAM:  AWS-IAM-Authentication-Methods-1024x450


Console password:

  • sign in to interactive sessions such as the AWS Management Console.
  • allow selected IAM users to change their passwords by disabling the option for all users and using an IAM policy to grant permissions for the selected users.
  • The password policy
    • at least one numerical character from 0 to 9.
    • contain between 6 to 128 characters
  • Users can be given access to change their own keys through IAM policy (not from the console).

Security Token Service

  • provides short-term authorization that IAM roles utilize.

Access Keys:

  • A combination of an  access key ID  and a  secret access key
    • can assign two active access keys to a user at a time.
    • max limit of access keys an IAM User may possess at a time: 2
    • IAM users are allowed two sets of access keys.
  • can be used to
    • make programmatic calls

      to AWS when using the API in program code

    • or at a command prompt when using the AWS CLI or the AWS PowerShell tools.
  • aws configure
    • the command needed to allow access key configuration.
  • can create, modify, view or rotate access keys.
  • Ensure access keys and secret access keys are stored securely.
    • When created IAM returns the access key ID and secret access key.
    • The secret access is returned only at creation time and if lost a new key must be created.
  • disable a user’s access key will prevents it from being used for API calls.

  • Access keys are updated immediately, once the associated IAM User’s access is updated.

  • Once the secret key has been lost, generating new access keys for the application is necessary.

  • configuring access key entry to AWS account.
    • Region name
    • Output format
    • Installation of the AWS CLI Interface
    • Access key ID
    • Secret access key

Server certificates:

  • can use SSL/TLS certificates to authenticate with some AWS services.
  • use the AWS Certificate Manager (ACM) to provision, manage and deploy server certificates.
    • Use IAM only when you must support HTTPS connections in a region that is not supported by ACM.

if your account compromised

Screen Shot 2020-06-12 at 18.14.58

.

This post is licensed under CC BY 4.0 by the author.

Comments powered by Disqus.