Questions tagged [identity-management]

broad term used for authentication and authorization systems

This term is broadly used to cover issues such as how users are given an identity, the protection of that identity, and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.) detailed reading

286 questions
-1
votes
0 answers

How to create the IAM Policy for hide the ec2 instance for the particular user. Otherwise the instance does not visible to anyone

I'm looking for a way to restrict the visibility ec2 instances to certain IAM accounts. I'd really like a way for a particular account to only be able to see the instances that it has created. { "Version": "2012-10-17", "Statement": [ …
-1
votes
1 answer

User: arn:aws:sts::****:assumed-role/aws-lambda-execute/**** is not authorized to perform: cognito-idp:AdminInitiateAuth on resource: arn:aws:cognito

Thanks in advace for the help! I am encountering an error when deploying my frontend nextjs code on vercel, whereas the same code is working correctly on my local machine. I am using aws lambda and cognito service. lambda already deployed but and…
-1
votes
1 answer

Lambda function cannot PutItem in DynamoDB database

Although I have given the function IAM profile complete AdministratorAccess permissions, along with AmazonDynamoDBFullAccess permissions as well, every time that I test the function I am greeted with the same error message: no identity-based policy…
-1
votes
1 answer

How to allow aws programatic user to create resources using assume role

I have created a policy X with ec2 and vpc full access and attached to userA. userA has console access. So, using switch role userA can create instance from console. Now, userB has programatic access with policy Y with ec2 and vpc full access. But…
Mohd
  • 1
-1
votes
1 answer

I want the Google Cloud Storage bucket to be accessible only from my app (mobile/web)

This is driving me crazy… I want to store images into Google Cloud Storage and the images to be only accessible from our app, because the uploaded image may contain privacy sensitive content. I kept googling last couple of hours and haven’t got a…
-1
votes
1 answer

Is there an open standard API for writing user properties into a user directory?

There are established and popular protocols for identity providers to provide a client with properties about the logged in user. For example in OpenID Connect (OIDC) the client can request access to certain scopes and then read claims about the…
pixelistik
  • 7,541
  • 3
  • 32
  • 42
-1
votes
1 answer

MalformedPolicyDocument error on aws policy creation - terraform apply

While inserting new aws IAM policy rule on terraform, terraform plan passes as terraform apply fails on the statement ID. data "aws_iam_policy_document" "db_iam_policy_document" { version = "2012-10-17" statement { actions =…
avivamg
  • 12,197
  • 3
  • 67
  • 61
-1
votes
1 answer

SQL Query to check all the plugins deployed in OIM

I have to check what all plugins are deployed in my all the environments of OIM. I can do MDS export to check the same. But I need a quicker solution to do the same. Is there a SQL query to check the same?
Chaitanya K
  • 1,827
  • 4
  • 32
  • 67
-2
votes
1 answer

Would you prefer a public or a private Blockchain for managing identities and the authentification in organisations?

I am working on a blockchain implementation and I'm stucked for weeks now at the decision whether I should use a public or a private Blockchain. It's so difficult to decide. I want to manage the identities across organisations (organisations which…
-3
votes
0 answers

IAM best practices, whitepapers/patterns

all. I am looking to find some information on IAM best practices or some whitepapers/patterns (or even tools if there any) to help me refactor my IAM policies for all my services. Are there any whitepaper/patterns/examples or tools that you have…
1 2 3
18
19