AWS Identity Basics Flashcards
What’s an example of how IAM allows you to maintain records of identity?
The user list.
What five elements is IAM commonly used to manage
- Users
- Groups
- Roles
- IAM Policies
- Authentication attributes (uids, pwds, keys, mfa, pwd policies)
What two methods can IAM use to authenticate your identity
- Userid/Password presentation at the console
- Access key usage at the API level
What two components form an IAM access key?
- Access key ID
- Secret access key
Are userid/passwords and access keys considered long term or short term access credentials? What makes them so?
Long term access credentials. No expiration / no changes unless initiated by the user.
What kinds of keys can an IAM user maintain for AWS CodeCommit?
- SSH Keys
- HTTPS Git credentials
Users and roles are both known as what kind of identity? Why?
Real identities.
- Have an Amazon reference name
- Can be referenced in other areas of AWS (policies)
IAM can enforce specific password character types. Which types can it enforce?
- Uppercase
- Lowercase
- Number
- Non-alphanumeric
Can IAM enforce a minimum password length?
Ayep.
What three provisions can IAM enforce around password changes?
- Enforced password expiration periods
- Enforced password reuse rejection
- Enforce admin requirement to reset after expiry
Which permission policies are attached to a new IAM user?
None.
Without explicit allowances, is an IAM user ALLOWed or DENYed access to services?
Denied. All policies have an implicit deny.
When multiple policies conflict explicitly, does an ALLOW or a DENY override the conflict?
DENY. Explicit denies always ‘win’.
IAM can allow external identities to access AWS resources. What’s the mechanism it uses to do this, and what’s this usage known as?
STS (security token service) - the usage is known as Federated Identities.
What’s the limit of IAM users per account?
5000
Is there any way to get around the limitation of max IAM users per account?
Yes - use STS and Identity Federation. Delegate the provision of identities to an external provider, and once that entity is verified you can allow it access to AWS resources.
What three elements are ALWAYS present in an IAM policy?
Effect, Action, and Resource
What does the Effect element of an IAM policy do?
Determines what effect the rest of the statement has - generally of the Allow or Deny flavors.