AWS Identity and Access Management (IAM) | Multi-Factor Authentication Flashcards
Are there any default quota limits associated with IAM?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
Yes, by default your AWS account has initial quotas set for all IAM-related entities. For details see Limitations on IAM Entities and Objects.
These quotas are subject to change. If you require an increase, you can access the Service Limit Increase form via the Contact Us page, and choose IAM Groups and Users from the Limit Type drop-down list.
What is AWS MFA?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
AWS multi-factor authentication (AWS MFA) provides an extra level of security that you can apply to your AWS environment. You can enable AWS MFA for your AWS account and for individual AWS Identity and Access Management (IAM) users you create under your account.
How does AWS MFA work?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
AWS MFA uses an authentication device that continually generates random, six-digit, single-use authentication codes. There are two primary ways to authenticate using an AWS MFA device:
AWS Management Console users: When a user with MFA enabled signs in to an AWS website, they are prompted for their user name and password (the first factor–what they know), and an authentication code from their AWS MFA device (the second factor–what they have). All AWS websites that require sign-in, such as the AWS Management Console, fully support AWS MFA. You can also use AWS MFA together with Amazon S3 secure delete for additional protection of your S3 stored versions.
AWS API users: You can enforce MFA authentication by adding MFA restrictions to your IAM policies. To access APIs and resources protected in this way, developers can request temporary security credentials and pass optional MFA parameters in their AWS Security Token Service (STS) API requests (the service that issues temporary security credentials). MFA-validated temporary security credentials can be used to call MFA-protected APIs and resources.
How do I help protect my AWS resources with MFA?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
Follow two easy steps:
- Get an authentication device. You have two options:
Purchase a hardware device from Gemalto, a third-party provider.
Install a virtual MFA–compatible application on a device such as your smartphone.
Visit the AWS MFA page for details about how to acquire a hardware or virtual MFA device.
- After you have an authentication device, you must activate it in the IAM console. You can also use the IAM CLI to activate the device for an IAM user.
Is there a fee associated with using AWS MFA?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
AWS does not charge any additional fees for using AWS MFA with your AWS account. However, if you want to use a physical authentication device then you will need to purchase an authentication device that is compatible with AWS MFA from Gemalto, a third party provider. For more details, please visit Gemalto’s website.
Can I have multiple authentication devices active for my AWS account?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
Yes. Each IAM user can have its own authentication device. However, each identity (IAM user or root account) can be associated with only one authentication device.
Can I use my authentication device with multiple AWS accounts?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
No. The authentication device or mobile phone number is bound to an individual AWS identity (IAM user or root account). If you have a TOTP-compatible application installed on your smartphone, you can create multiple virtual MFA devices on the same smartphone. Each one of the virtual MFA devices is bound to a single identity, just like a hardware device. If you dissociate (deactivate) the authentication device, you can then reuse it with a different AWS identity. The authentication device cannot be used by more than one identity simultaneously.
I already have a hardware authentication device from my place of work or from another service I use, can I re-use this device with AWS MFA?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
No. AWS MFA relies on knowing a unique secret associated with your authentication device in order to support its use. Because of security constraints that mandate such secrets never be shared between multiple parties, AWS MFA cannot support the use of your existing hardware authentication device. Only a compatible hardware authentication device purchased from Gemalto can be used with AWS MFA.
Purchasing an MFA Device
I’m having a problem with an order for an authentication device using the third-party provider Gemalto’s website. Where can I get help?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
Gemalto’s customer service can assist you.
I received a defective or damaged authentication device from the third party provider Gemalto. Where can I get help?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
Gemalto’s customer service can assist you.
I just received an authentication device from the third party provider Gemalto. What should I do?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
You simply need to activate the authentication device to enable AWS MFA for your AWS account. See the IAM console to perform this task.
Provisioning a Virtual MFA Device
What is a virtual MFA device?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
A virtual MFA device is an entry created in a TOTP compatible software application that can generate six-digit authentication codes. The software application can run on any compatible computing device, such as a smartphone.
What are the differences between a virtual MFA device and physical MFA devices?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
Virtual MFA devices use the same protocols as the physical MFA devices. Virtual MFA devices are software based and can run on your existing devices such as smartphones. Most virtual MFA applications also allow you to enable more than one virtual MFA device, which makes them more convenient than physical MFA devices.
Which virtual MFA applications can I use with AWS MFA?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
You can use applications that generate TOTP-compliant authentication codes, such as the Google Authenticator application, with AWS MFA. You can provision virtual MFA devices either automatically by scanning a QR code with the device’s camera or by manual seed entry in the virtual MFA application.
Visit the MFA page for a list of supported virtual MFA applications.
What is a QR code?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
A QR code is a two-dimensional barcode that is readable by dedicated QR barcode readers and most smartphones. The code consists of black squares arranged in larger square patterns on a white background. The QR code contains the required security configuration information to provision a virtual MFA device in your virtual MFA application.
How do I provision a new virtual MFA device?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
You can configure a new virtual MFA device in the IAM console for your IAM users as well as for your AWS root account. You can also use the aws iam create-virtual-mfa-device command in the AWS CLI or the CreateVirtualMFADevice API to provision new virtual MFA devices under your account. The aws iam create-virtual-mfa-device and the CreateVirtualMFADevice API return the required configuration information, called a seed, to configure the virtual MFA device in your AWS MFA compatible application. You can either grant your IAM users the permissions to call this API directly or perform the initial provisioning for them.
How should I handle and distribute the seed material for virtual MFA devices?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
You should treat seed material like any other secret (for example the AWS secret keys and passwords).
How can I enable an IAM user to manage virtual MFA devices under my account?
Multi-Factor Authentication
AWS Identity and Access Management (IAM) | Security, Identity & Compliance
Grant the IAM user the permission to call the CreateVirtualMFADevice API. You can use this API to provision new virtual MFA devices.
SMS MFA