AWS for DevOps - Part 02
Manjunath Irukulla
DevOps and Cloud @OnwE | Freelance Technical Writer | 1x Azure | GitHub Certified | Ex GDSC DevOps and Open-source Lead | Terraform | Docker | Kubernetes | AWS | Azure
Prerequisites:
To continue this blog you must have created an account on AWS. if you haven't made one, then try this blog to create one.
That's great, You've created your account on AWS.
What is IAM?
AWS IAM (Identity and Access Management) is a vital service provided by Amazon Web Services, enabling organizations to manage access to their AWS resources securely. Let's explore a real-life scenario to better understand its significance.
As a new DevOps engineer joining a company, you need access to the organization's code and cloud resources. However, sharing direct credentials or granting full access poses security risks. Additionally, adding you as a member to a shared cloud account might not be practical.
AWS IAM - the solution to these challenges. IAM allows the organization's administrators to allocate specific permissions to you, the new user, ensuring you can access the necessary files and resources without compromising security. By granting granular permissions, IAM enhances the principle of least privilege, enabling you to perform your duties effectively while maintaining a secure cloud environment.
With IAM, you can access the company's cloud resources seamlessly and contribute to projects without any disruptions, all while adhering to stringent security practices. It provides a fine-grained control mechanism, offering a robust and safe foundation for your work within the organization's AWS environment.
Let us try to learn what are authentication and authorization to understand how IAM works easily.
Authentication
Imagine you have a secret club, and only your best friends are allowed to join and play together. But how will you know if someone is really your friend and not a stranger trying to sneak in? That's where authentication comes in!
Authentication is like a special secret password or a secret handshake that only your true friends know. When someone wants to join your club, they need to say the secret password or do a secret handshake to prove they are your friend. If they get it right, you know they are a real friend, and you let them in to play with you.
When you use a device, sometimes you need to prove that you are the real you before you can do certain things. It's like having a secret password for your devices. This way, only you can access your games, pictures, and other important stuff on your device. It keeps your things safe and makes sure no one else can pretend to be you.
Just like in your secret club, authentication helps make sure only the right people can use certain things or access certain places. It's like having a magic password that only you and your friends know to keep everything secure.
Authorization
For example, some friends might have a badge that lets them go to the secret room, while others can only play in the main area.
领英推荐
Authorization is like having these special badges. It decides what each club member is allowed to do in the treehouse based on their badge level. Only the members with the right badges can go to certain areas or use specific toys.
In the digital world, authorization works the same way. When you use a computer, website, or app, you might have different levels of access to different parts of it. Some parts might be off-limits unless you have the right "digital badge" or permission.
That's authorization in action! It's like having a special key that opens only the doors you're allowed to go through.
Authorization keeps everything organized and fair, just like your treehouse club. It makes sure everyone can enjoy the parts they're supposed to and keeps the things they're not supposed to use safe and secure. So, just like your special badges, authorization helps make sure everyone gets to have fun in the right places.
How Does IAM Work?
These guardians are called "IAM users" and "IAM roles." They have unique names and special powers, known as "permissions."
Now, let's see how it all works together:
Basic Terms in IAM
Basic Operations of IAM
I'm thrilled to give a massive shoutout to Mariusz Michalowski ??
In this article, I've poured out everything I've absorbed through practical experience and dedicated learning from online resources. Yet, there's an immense distinction between a learner's viewpoint and that of a seasoned industry professional.
If you're eager to grasp the ins and outs of the IAM service, I wholeheartedly recommend delving into Mariusz's comprehensive article on IAM services. His insights are a game-changer, offering a deep dive into the topic from an expert perspective. Don't miss out! ??
I hope you guys learned something new from this blog and also if you like this, please share it with people who you feel deserve it. To not miss the next upcoming blog on AWS or DevOps-related blogs please follow me.