AWS Authentication Mechanisms
In this course, we shall be looking at how AWS provides many different means of authentication.
- The different methods of authentication that can be implemented when using AWS
- The difference between username/password and Multi-factor authentication
- How to configure MFA authentication
- The process in which programmatic authentication is managed
- How IAM roles can be used to authenticate and authorize EC2 instances to access resources
- How Key Pairs are used to authenticate you to newly created EC2 instances
- The different options available with regards to federated authentication
- AWS Administrators
- Security Engineers
- Security Architects
- And anyone who is looking to increase their knowledge of security and authentication within AWS
You should have a basic understanding of AWS IAM and what the service is used for. It would also be advantageous if you had some basic hands-on experience of Amazon EC2, but it is not essential.
Hello, and welcome to this course where I shall be looking at how AWS provides a variety of different means of authentication. My name is Stuart Scott and I'm the AWS Content Director here at Cloud Academy. Feel free to connect with me to ask any questions using the details shown on the screen. Alternatively, you can always get in touch with us here at Cloud Academy by sending an email to firstname.lastname@example.org, where one of our cloud experts will reply to your question.
This course has been created for those who are AWS administrators, security engineers, security architects, and anyone who is looking to increase their knowledge of security and authentication within AWS. By the end of this course, you will have a greater understanding of the different methods of authentication that can be implemented when using AWS. The difference between username and password and multi-factor authentication. How to configure MFA authentication.
The process in which programmatic authentication is managed. How IAM roles can be used to authenticate and authorize EC2 instances to access resources. How key pairs are used to authenticate you to newly created EC2 instances, and the different options available with regard to Federated authentication. As a prerequisite to this course, you should have a basic understanding of AWS IAM and what the service is used for. It would also be advantageous if you had some basic hands-on experience of Amazon EC2, but this is not essential.
Feedback on our courses here at Cloud Academy is valuable to us as trainers and any students looking to take the same course in the future. If you have any feedback, positive or negative, it would be greatly appreciated if you can contact email@example.com.
Please note that at the time of writing this content, all course information was accurate. AWS implements hundreds of updates every month as a part of its ongoing drive and innovation to enhance its services. As a result, minor discrepancies may appear in the course content over time, but here at Cloud Academy we strive to keep our content up to date in order to provide the best training available. So, if you notice any information that is outdated, please contact firstname.lastname@example.org, and this will allow us to update the course during its next release cycle. Thank you.
Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.
To date, Stuart has created 150+ courses relating to Cloud reaching over 180,000 students, mostly within the AWS category and with a heavy focus on security and compliance.
Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.
He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.
In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.
Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.