1. Home
  2. Training Library
  3. Amazon Web Services
  4. Courses
  5. Understanding AWS Database Authentication & Access Controls

Authenticating to Amazon DynamoDB

Contents

keyboard_tab
Course Introduction
1
Introduction
PREVIEW2m 10s
Course Conclusion
6
Summary
4m 58s

The course is part of these learning paths

Working with AWS Databases
course-steps
18
certification
3
lab-steps
10
AWS Security, Identity & Compliance
course-steps
23
certification
2
lab-steps
7
Start course
Overview
Difficulty
Intermediate
Duration
24m
Students
252
Ratings
5/5
starstarstarstarstar
Description

This course covers the different options available to you to enable you to authenticate to your Amazon RDS and Amazon DynamoDB Databases. You'll learn about the difference between authentication and authorization, as well as Identity and Access Management, and how to authenticate to Amazon RDS, and DynamoDB.

If you have any feedback relating to this course, feel free to contact us at support@cloudacademy.com.

Learning Objectives

  • Define the differences between authentication and authorization  
  • Understand the key components of IAM used for access control and authentication
  • Learn the authentication methods used to access RDS databases across different DB engines
  • Learn the authentication controls of Amazon DynamoDB

Intended Audience

This course has been designed to assist those who are responsible for securing, designing, and operating AWS Database solutions. It is also ideal for anyone who is looking to take the AWS Certified Database - Specialty exam.

Prerequisites

To get the most out of this course, you should have a basic awareness of AWS database services, in addition to AWS Identity & Access Management.

Transcript

Hello and welcome to this lecture where I shall be looking at how to authenticate to and access Amazon DynamoDB.  

Amazon DynamoDB focuses on ensuring you are authenticated through the relevant IAM permissions to access its resources, regardless of how those permissions are applied using IAM policies, either attached through users, groups, roles, or even federated access. Without IAM permissions you will not be able to access the DynamoDB table and its resources, and these need to be applied within an identity-based policy, as DynamoDB does not support resource-based policies.

With this in mind, you need to understand your DynamoDB resources, specifically the ARNs of the resource in question to allow you to apply an identity-based policy to allow permission to use it.

When using Amazon DynamoDB, there are of course Tables, and this is the primary resource of the service, but you can also access Indexes and Streams. The ARNs of these resources are typically referenced as shown here, where the text in red should be replaced by your own values.

As DynamoDB only allows permissions issued through identity-based policies, here is an example of a policy that will allow the associated identity(s) to perform the following functions: GetItem, Query, and Scan. And in the example, I have used a DynamoDB table called ‘MyTable’.

So compared to Amazon RDS, the authentication options are much simpler with DynamoDB, it is purely based upon AWS IAM Identity-based policies. 

About the Author
Avatar
Stuart Scott
AWS Content Director
Students
144268
Labs
1
Courses
121
Learning Paths
87

Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.

To date, Stuart has created 90+ courses relating to Cloud reaching over 140,000 students, mostly within the AWS category and with a heavy focus on security and compliance.

Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.

He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.

In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.

Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.